Abstract
Security is a war between two opponents. On one side, the security designers and practitioners defend assets. On the other, cyberhackers attempt to steal, impair, or destroy these assets. Most of the traditional rules of warfare apply to cybersecurity.
War is the father and king of all
(Heraclitus).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The actual Latin citation in the book is “Igitur qui desiderat pacem, praeparet bellum.” Nevertheless, popular culture favored the adapted version, which is easier to memorize. The meaning stays the same.
- 2.
The phoney war (in French).
- 3.
It is rumored that the settlement was around one billion of Euros (1.1 billion US dollars).
- 4.
It is interesting to see that, with the FIDO alliance, there is a return to physical tokens. Smartphones may not be as secure as physical tokens embedding a secure processor.
- 5.
These steps are typical for waterfall methodologies. For agile methodologies, the two first steps are integrated into each sprint period. Maintenance extends over all sprint periods and continues after the final release.
- 6.
This is probably never true with current complex systems.
- 7.
FreeType is a portable library that displays vector and bitmap fonts.
- 8.
The same is true for software development at large. The earlier a bug is discovered, the easier and the cheaper it is to fix it. A thorough early design phase reduces many issues later in integration phase.
- 9.
ZMap is an open-source project supported by the University of Michigan. Masscan is an open-source project supported by the Errata Security team.
- 10.
In 2004, French cryptanalyst Antoine Joux generated such a collision for SHA-0 [257].
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Diehl, E. (2016). Law 5: Si Vis Pacem, Para Bellum. In: Ten Laws for Security. Springer, Cham. https://doi.org/10.1007/978-3-319-42641-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-42641-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42639-6
Online ISBN: 978-3-319-42641-9
eBook Packages: Computer ScienceComputer Science (R0)