{"id":185,"date":"2011-06-20T14:24:12","date_gmt":"2011-06-20T14:24:12","guid":{"rendered":""},"modified":"2011-06-20T14:24:12","modified_gmt":"2011-06-20T14:24:12","slug":"ten_immutable_laws_of_security","status":"publish","type":"post","link":"https:\/\/blogs.ncl.ac.uk\/isg\/?p=185","title":{"rendered":"Ten Immutable Laws Of Security"},"content":{"rendered":"<p><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/hh278941.aspx\">Interesting article<\/a> on TechNet:<\/p>\n<p><strong>Law #1: <\/strong><\/p>\n<p>If a bad guy can persuade you to run his program on your computer, it&#8217;s not solely your computer anymore.<\/p>\n<p><strong>Law #2: <\/strong><\/p>\n<p>If a bad guy can alter the operating system on your computer, it&#8217;s not your computer anymore.<\/p>\n<p><strong>Law #3: <\/strong><\/p>\n<p>If a bad guy has unrestricted physical access to your computer, it&#8217;s not your computer anymore.<\/p>\n<p><strong>Law #4: <\/strong><\/p>\n<p>If you allow a bad guy to run active content in your website, it&#8217;s not your website any more.<\/p>\n<p><strong>Law #5: <\/strong><\/p>\n<p>Weak passwords trump strong security.<\/p>\n<p><strong>Law #6: <\/strong><\/p>\n<p>A computer is only as secure as the administrator is trustworthy.<\/p>\n<p><strong>Law #7: <\/strong><\/p>\n<p>Encrypted data is only as secure as its decryption key.<\/p>\n<p><strong>Law #8: <\/strong><\/p>\n<p>An out-of-date antimalware scanner is only marginally better than no scanner at all.<\/p>\n<p><strong>Law #9:<\/strong> <\/p>\n<p>Absolute anonymity isn&#8217;t practically achievable, online or offline.<\/p>\n<p><strong>Law #10:<\/strong> <\/p>\n<p>Technology is not a panacea.<\/p>\n<p><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/hh278941.aspx\">http:\/\/technet.microsoft&#8230;.y\/hh278941.aspx<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Interesting article on TechNet: Law #1: If a bad guy can persuade you to run his program on your computer, it&#8217;s not solely your computer anymore. Law #2: If a bad guy can alter the operating system on your computer, &hellip; <a href=\"https:\/\/blogs.ncl.ac.uk\/isg\/?p=185\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4740,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-185","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/blogs.ncl.ac.uk\/isg\/index.php?rest_route=\/wp\/v2\/posts\/185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ncl.ac.uk\/isg\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ncl.ac.uk\/isg\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/isg\/index.php?rest_route=\/wp\/v2\/users\/4740"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/isg\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=185"}],"version-history":[{"count":0,"href":"https:\/\/blogs.ncl.ac.uk\/isg\/index.php?rest_route=\/wp\/v2\/posts\/185\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.ncl.ac.uk\/isg\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/isg\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/isg\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}