18. Human Issues
Throughout this book, we've been discussing the tools that one needs to build a secure system. Theoretically, at this point, you should be able to construct a system that holds up against a wide array of attacks. For the sake of illustration, let's assume that you've built such a system. You've designed it with security in mind, and you've used threat models to aid in that design. You've locked down all the communication with cryptography, you've tested your code, and maybe you've even formally modeled the entire system. Let's assume that you've used all the tools in the shop, you've used them all correctly, and you've constructed an airtight system that solves your problem. One question remains: can anyone really use the system? ...
Get The Craft of System Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.