Tuesday, September 25, 2007

A, then C, then I!?

Something compelled me :-) to highlight this blurb from Richard's old blog post; a deep insight that I missed before: "One final note on adversaries:
  • First they DoS'd us (violating availability).
  • Now they're stealing from us (violating confidentiality).
  • When will they start modifying our data in ways that benefit them in financial and other ways (violating integrity)?
We will not be able to stop all of it and we will need our applications and data to help tell us what is happening."

... which also reminds me of semantic attacks.

No comments:

Dr Anton Chuvakin