IT Security Model

Nov 19, 2015 09:31 PM
635835360503897739.jpg

Hi fellows!

I finally decided to join this forum, which I find very interesting and has some great contributions into the tech and security space, appreciate it!

I decided that I wanted to share a some of my thoughts. Me and my study team while studying IT security "developed" this general model for security within IT, which I find often is overseen because it is "so basic":

635835360503897739.jpg

But our point with this model is to illustrate that you have to take these three key points into account when developing as system. I often speak to people who wishes me or someone else to develop a system for their needs and they tell me: "I need MAXIMUM security". Which in my opinion is not the case, as the perfect secured system is unusable. (a system on the bottom of the sea in a secured-box)

This model should illustrate that security is a trade-off between functionality and usability, and you cannot maximise all of these completely.

I would really like to hear your thoughts on my thoughts and the model we created.

Thanks and a please to read posts from some of the great contributors.

/Bytewiz

Just updated your iPhone? You'll find new Apple Intelligence capabilities, sudoku puzzles, Camera Control enhancements, volume control limits, layered Voice Memo recordings, and other useful features. Find out what's new and changed on your iPhone with the iOS 18.2 update.

Comments

No Comments Exist

Be the first, drop a comment!