tag:blogger.com,1999:blog-4088979.post76971442720566026..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Enemy-Centric vs Population-Centric SecurityRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4088979.post-88354194894028856082007-02-01T16:54:00.000-05:002007-02-01T16:54:00.000-05:00Right, the issue with single checkpoint is - ugly ...Right, the issue with single checkpoint is - ugly failure mode.<br /><br />http://1raindrop.typepad.com/1_raindrop/2006/02/systempunkt_in_.html<br /><br />What I like about RIchard's asset and threat characterizations is that you can plan, design, and execute differently for each concern.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-73547142925706197902007-02-01T14:54:00.000-05:002007-02-01T14:54:00.000-05:00This is brilliant. Reminds me of Joe Yoders securi...This is brilliant. Reminds me of Joe Yoders security design patterns. Its pretty fun to play out a scenario of a military camp and ask people if they would secure it with a single checkpoint or multiple ones. Then stir it up and tell them journalists have now invaded the based with military uniforms on, now what? Single checkpoint folks start panicking.... <br /><br />http://www.joeyoder.com/papers/patterns/Security/appsec.doc<br /><br />Couldnt find a none word version (sorry)Anonymousnoreply@blogger.com