Secure Coding mailing list archives

Aedificatoria: Layered Weak Links


From: Alfonso De Gregorio <adg () secYOUre com>
Date: Fri, 25 Mar 2011 12:31:05 +0100

Greetings SC-L,

I've recently kicked off Aedificatoria, a column on security
architectures and architecting security.
Articles - sometimes op-ed - will be aimed at addressing:
- our working landscape (with its tools, objects, technologies,
processes, and challenges);
- the architecture, as the set of theoretical and practical knowledge
driving our activities;
- ourselves and the human element.

Without further ado, the first victim of the column is Defense in
Depth and its relationship with survivability and mission assurance:

  Layered Weak Links - The Ability to Refresh Attack Cost is Key to
  Mission Success, but Seldom Available:
  http://plaintext.crypto.lo.gy/article/437/aedificatoria-layered-weak-links

As always, I very welcome your feedback and, if you feel inclined,
your guest posts. It is your contributions which will make
Aedificatoria an edifying space.

Ciao,
alfonso

-- 
 Alfonso De Gregorio

 BeeWise, Security Event Futures - http://beewise.org/
 Software Security's Futures Plural  http://plaintext.crypto.lo.gy/ssfp
_______________________________________________
Secure Coding mailing list (SC-L) SC-L () securecoding org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________


Current thread: