tag:blogger.com,1999:blog-4088979.post8441671421639980042..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Technical Visibility LevelsRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger9125tag:blogger.com,1999:blog-4088979.post-4540507898902909512009-11-13T01:36:35.794-05:002009-11-13T01:36:35.794-05:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-46062202012801466932009-10-19T05:40:07.869-04:002009-10-19T05:40:07.869-04:00I would have started from the point:
The trustwor...I would have started from the point:<br /><br /><i>The trustworthiness of a digital asset is limited by the asset's ability to be compromised...</i><br /><br />And spent all my time reducing that surface area. But maybe this is a luxury not permitted to me?ianghttps://financialcryptography.com/mt/archives/001201.htmlnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-53652613467971944542009-10-09T11:02:25.219-04:002009-10-09T11:02:25.219-04:00"The trustworthiness of a digital asset is li..."The trustworthiness of a digital asset is limited by the owner's capability to detect incidents compromising the integrity of that asset."<br /><br />great tweet, I would add that the trustworthiness of a digital asset is limited by the owner's capability to *deliver* integrity *to* that asset.<br /><br />afaik we have never built a single high integrity system, so there is opportunity for improvement there as wellGunnarhttp://1raindrop.typepad.comnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-82637891700711147612009-10-08T16:27:59.170-04:002009-10-08T16:27:59.170-04:00The trustworthiness of a digital asset is limited ...The trustworthiness of a digital asset is limited more by the trustworthiness of the owner than tamper detection. An owner with desire of privacy and data integrity has the means to protect digital assets.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-7243498371228152222009-10-08T16:21:20.822-04:002009-10-08T16:21:20.822-04:00Love the idea but to expand it a bit at level 5 wo...Love the idea but to expand it a bit at level 5 would be ability to examin the source code. Having that ability can only enhance ones trust in a system/app.Unknownhttps://www.blogger.com/profile/12483919520436808331noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-43462667723613028892009-10-08T10:54:08.314-04:002009-10-08T10:54:08.314-04:00You could also relate them to the relationship bet...You could also relate them to the relationship between effort in detection (scaling roughly from 0-5) and the amount of useful data (scales inversely).Kyle Maxwellhttp://rift.chromebits.netnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-4337536064068509992009-10-08T09:03:52.028-04:002009-10-08T09:03:52.028-04:00Love the post. Visibility Maturity is a great conc...Love the post. Visibility Maturity is a great concept!<br /><br />Maybe (if there's going to be a part 2-3) you can give justifications -based on usefulness- for each level of segmentation? They're somewhat apparent just by the descriptions you have there, but I'd like to see why you make the distinctions at those points.Alexhttp://www.newschoolsecurity.comnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-63989527990964159442009-10-08T04:26:47.421-04:002009-10-08T04:26:47.421-04:00Richard,
Good point, especially given the prolifer...Richard,<br />Good point, especially given the proliferation of security (and other) "appliances" which are essentially unmanaged (unmanageable?) and also given that the coders of security software don't seem to know much about secure coding! I think another good example for Point 5 would be making the device monitorable/manageable via SNMP (of course v3 - otherwise you have a whole *different* set of concerns!)<br /><br />B-)Barry Andersonhttps://www.blogger.com/profile/12717352429445608699noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-9463323146175930442009-10-07T23:37:20.259-04:002009-10-07T23:37:20.259-04:00IMO this topic needs a 2 - 3 part series...IMO this topic needs a 2 - 3 part series...Ramki B Ramakrishanhttps://www.blogger.com/profile/01821869956279526416noreply@blogger.com