Re: Security - more complex than I thought
pmiller@pksolut ions.com (Peter Miller) wrote in
<4amarv0aecnhfl q4qdfp1oeaidbq5 mtrdc@4ax.com>:
[color=blue]
>On Fri, 14 Nov 2003 20:57:28 GMT, dXXXfenton@bway .net.invalid
>(David W. Fenton) wrote in comp.databases. ms-access:
>[color=green]
>>Seems to me Mike is telling his clients not "pretty good" but
>>"good enough for the circumstances we've foreseen and within the
>>budget we've got and within the estimation of potential risk that
>>we foresee at the present time."[/color]
>
>Really? You really think that the clients will take "good
>enough for the circumstances we've foreseen and within the budget
>we've got and within the estimation of potential risk that we
>foresee at the present time." as being anything less than an
>endorsement of the security capabilities of their application?
>I'd say that such a statement would very much be taken by the
>client as 'don't worry about security in this app - it's up to the
>task'.[/color]
If the statement is true, then it *is* up to the task, as the task
is defined.
You're defining the task itself differently than Mike is, and that
was the point of my long definition, to define the task in terms of
the client's specific situation.
There is no circumstance in which security can be considered that
does not need to be defined as "sufficient for the circumstances
we've foreseen and within the budget we've got and within the
estimation of potential risk that we foresee at the present time."
That is the definition that applies to security considerations of
any organization, any application, any database.
You seem to be arguing that the only worthwhile protection is "more
than sufficient for the circumstances we've foreseen, etc."
At least, that's the only way I can see it.
--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
							
						
					pmiller@pksolut ions.com (Peter Miller) wrote in
<4amarv0aecnhfl q4qdfp1oeaidbq5 mtrdc@4ax.com>:
[color=blue]
>On Fri, 14 Nov 2003 20:57:28 GMT, dXXXfenton@bway .net.invalid
>(David W. Fenton) wrote in comp.databases. ms-access:
>[color=green]
>>Seems to me Mike is telling his clients not "pretty good" but
>>"good enough for the circumstances we've foreseen and within the
>>budget we've got and within the estimation of potential risk that
>>we foresee at the present time."[/color]
>
>Really? You really think that the clients will take "good
>enough for the circumstances we've foreseen and within the budget
>we've got and within the estimation of potential risk that we
>foresee at the present time." as being anything less than an
>endorsement of the security capabilities of their application?
>I'd say that such a statement would very much be taken by the
>client as 'don't worry about security in this app - it's up to the
>task'.[/color]
If the statement is true, then it *is* up to the task, as the task
is defined.
You're defining the task itself differently than Mike is, and that
was the point of my long definition, to define the task in terms of
the client's specific situation.
There is no circumstance in which security can be considered that
does not need to be defined as "sufficient for the circumstances
we've foreseen and within the budget we've got and within the
estimation of potential risk that we foresee at the present time."
That is the definition that applies to security considerations of
any organization, any application, any database.
You seem to be arguing that the only worthwhile protection is "more
than sufficient for the circumstances we've foreseen, etc."
At least, that's the only way I can see it.
--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
 
	
Comment