From the dWb website
Archived Article

Is security secure enough for the world that will evolve with the introduction of open source code.

Is a 4-digit code as secure as a time-controlled safe in your local bank.

How secure are open systems?

Even the bad guys have access to open source code

Revisit the security policies to embrace the new world of open sourcee to ensure that security is still secure ...

The problem with open solutions is that they are open, everybody knows how they work even the bad guys. Whilst this problem gets bigger and bigger what are the IT specialists doing? They are engaged in a regular bladder emptying contest - my open system has not got as many gaping holes in it as yours. The real problem is that in the past electronic fraud was a highly specialist occupation normally practiced by the people who either built or maintained the proprietary systems. The opportunities were limited so not very frequent.

Now that technology is pervasive, children are taught it in the classrooms, commerce cannot function without it and are desperate for more. It all comes down to the basic supply-demand laws of economics - the more there is of anything, the bigger the market. The security of banks is now so good that it acts as a deterent - apart from those who really want to be captured on camera. But the banks do not have that much money in them anymore - its either on the street corners protected by a piece of plastic and a 4-digit code or electronic protected by a piece of plastic and sometimes a 4-digit code - often the same piece of plastic and the same 4-digit code. The opportunities have become unlimited so fraud occurs more frequently.

The answer is to develop a security strategy but this will only be successful if the problem is really understood - what are you protecting, who wants its, how can they get it, what can you do about it. The answer does not lay in the size of the security holes, the strength of the encryption algorithm or how the tunnel works - the answer is to become closed and reduce the number of potential perpetrators

 

This document maintained by dwb@dwb.co.uk. -------- Material Copyright © 1999-2002 dWb