News: IT Security Model

IT Security Model

Hi fellows!

I finally decided to join this forum, which I find very interesting and has some great contributions into the tech and security space, appreciate it!

I decided that I wanted to share a some of my thoughts. Me and my study team while studying IT security "developed" this general model for security within IT, which I find often is overseen because it is "so basic":

But our point with this model is to illustrate that you have to take these three key points into account when developing as system. I often speak to people who wishes me or someone else to develop a system for their needs and they tell me: "I need MAXIMUM security". Which in my opinion is not the case, as the perfect secured system is unusable. (a system on the bottom of the sea in a secured-box)

This model should illustrate that security is a trade-off between functionality and usability, and you cannot maximise all of these completely.

I would really like to hear your thoughts on my thoughts and the model we created.

Thanks and a please to read posts from some of the great contributors.

/Bytewiz

Want to start making money as a white hat hacker? Jump-start your white-hat hacking career with our 2020 Premium Ethical Hacking Certification Training Bundle from the new Null Byte Shop and get over 60 hours of training from ethical hacking professionals.

Buy Now (90% off) >

Our Best Hacking & Security Guides

New Null Byte posts — delivered straight to your inbox.

4 Comments

welcome to Null Byte. I just recently signed up on this forum as well.

Does anyone have a IRC recommended Server? I'm also looking for word dictionaries like rockyou.txt but in different languages. Any ideas?

Any specificeret language?

The point is to try and realize a secyre system that doesn't sacriface usability, else there's no point in debate: just don't use your computer and you are safe.

Completly agree :-)

Some clients/people doesn't realize it

Share Your Thoughts

  • Hot
  • Latest