O'Reilly logo

Assessing Network Security by David LeBlanc, Kevin Lam, Ben Smith

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Key Principles of Security

From the perspective of someone who is charged with assessing security, security principles and best practices provide value in their application as well as insight into how and where security might be weak. To use an analogy, who would better know how to destroy a bridge than the engineer who designed the mechanics that make it strong? By understanding what makes security strong, you can, by deduction, predict where security is most vulnerable. Cryptography is a good example. Have you ever seen a movie where the would-be thieves break into a computer system by cracking 128-bit 3DES? In reality, 3DES, when properly implemented, is quite strong; consequently, attempting to crack the algorithm would not likely ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required