[2292] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Need a Security Consultant

daemon@ATHENA.MIT.EDU (Adam Shostack)
Sat Jun 29 21:52:13 1996

From: Adam Shostack <adam@homeport.org>
To: CDAVIDSO@IS.NMH.NMH.ORG (Davidson, Clyde)
Date: Sat, 29 Jun 1996 20:07:35 -0500 (EST)
Cc: www-security@ns2.rutgers.edu, secbydes@thoughtport.com
In-Reply-To: <199606271515.KAA01939@yeager.nmh.org> from "Davidson, Clyde" at Jun 27, 96 10:18:00 am
Errors-To: owner-www-security@ns2.rutgers.edu

Davidson, Clyde wrote:
| You have a good point.
| 
| Also, I am an Information Security Officer and I think that "highly   
| secure" and "cost-effective" are mutually exclusive terms in data   
| security. Not that you don't.

	Cost-effective is a matter of what you're protecting.  If your
security isn't cost-effective, then thats a problem.  There are times
when its easier to eat the loss than provide real security.  Witness
the cell phone industry in the US, where NSA/FBI fears of private
conversations cost the industry 20% of its income.

	Also, I wanted to mention that TIS does consulting.

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume


home help back first fref pref prev next nref lref last post