Based on my experiences with technology deployments since the late 1990s, I've realized that the following cycle defines just about every project I've ever seen.
The cycle is Feature -> Management -> "Security" -> Visibility.

I am seeing this cycle at work in the mobile device space right now. Hardly anyone is thinking about how to determine if a mobile device (Blackberry, etc.) is compromised. The best we can do is imagine the sorts of attacks that might be happening to our mobile infrastructure, without visibility regarding how those devices might already be under attack.
I call this operating only within the Decide -> Act part of the OODA loop (Observe -> Orient -> Decide -> Act). We do it all the time in digital security. I called it Soccer Goal Security in 2005.
Does this cycle resonate with anyone?
Tidak ada komentar:
Posting Komentar