1. Computer security in the real world
- Author
-
Butler W. Lampson
- Subjects
General Computer Science ,Computer science ,Network security ,Internet privacy ,Covert channel ,Data security ,Access control ,Audit ,Internet security ,Asset (computer security) ,Computer security ,computer.software_genre ,Logical security ,Security information and event management ,Information security audit ,Security association ,Distributed System Security Architecture ,Message authentication code ,Authentication ,Cloud computing security ,business.industry ,Authorization ,Information security ,Computer security model ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Security service ,Network Access Control ,Security through obscurity ,Network security policy ,The Internet ,business ,computer - Abstract
Most computers today are insecure because security is costly in terms of user inconvenience and foregone features, and people are unwilling to pay the price. Real-world security depends more on punishment than on locks, but it's hard to even find network attackers, much less punish them. The basic elements of security are authentication, authorization, and auditing: the gold standard. The idea of one principal speaking for another is the key to doing these uniformly across the Internet.
- Published
- 2004