Skip to main content

Law 5: Si Vis Pacem, Para Bellum

  • Chapter
  • First Online:
Ten Laws for Security

Abstract

Security is a war between two opponents. On one side, the security designers and practitioners defend assets. On the other, cyberhackers attempt to steal, impair, or destroy these assets. Most of the traditional rules of warfare apply to cybersecurity.

War is the father and king of all

(Heraclitus).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The actual Latin citation in the book is “Igitur qui desiderat pacem, praeparet bellum.” Nevertheless, popular culture favored the adapted version, which is easier to memorize. The meaning stays the same.

  2. 2.

    The phoney war (in French).

  3. 3.

    It is rumored that the settlement was around one billion of Euros (1.1 billion US dollars).

  4. 4.

    It is interesting to see that, with the FIDO alliance, there is a return to physical tokens. Smartphones may not be as secure as physical tokens embedding a secure processor.

  5. 5.

    These steps are typical for waterfall methodologies. For agile methodologies, the two first steps are integrated into each sprint period. Maintenance extends over all sprint periods and continues after the final release.

  6. 6.

    This is probably never true with current complex systems.

  7. 7.

    FreeType is a portable library that displays vector and bitmap fonts.

  8. 8.

    The same is true for software development at large. The earlier a bug is discovered, the easier and the cheaper it is to fix it. A thorough early design phase reduces many issues later in integration phase.

  9. 9.

    ZMap is an open-source project supported by the University of Michigan. Masscan is an open-source project supported by the Errata Security team.

  10. 10.

    In 2004, French cryptanalyst Antoine Joux generated such a collision for SHA-0 [257].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eric Diehl .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Diehl, E. (2016). Law 5: Si Vis Pacem, Para Bellum. In: Ten Laws for Security. Springer, Cham. https://doi.org/10.1007/978-3-319-42641-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42641-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42639-6

  • Online ISBN: 978-3-319-42641-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics