{"id":122,"date":"2005-08-07T00:37:45","date_gmt":"2005-08-07T04:37:45","guid":{"rendered":"https:\/\/www.suramya.com\/blog\/?p=122"},"modified":"2022-06-16T15:17:55","modified_gmt":"2022-06-16T09:47:55","slug":"10-immutable-laws-of-security","status":"publish","type":"post","link":"https:\/\/www.suramya.com\/blog\/2005\/08\/10-immutable-laws-of-security\/","title":{"rendered":"10 Immutable Laws of Security"},"content":{"rendered":"<p>Found these on the Microsoft TechNet website. Found them to be true so decided to share them with you all:<\/p>\n<p>Law #1: If a bad guy can persuade you to run his program on your computer, it&#8217;s not your computer anymore<br \/>\nLaw <a rel=\"tag\" class=\"hashtag u-tag u-category\" href=\"https:\/\/www.suramya.com\/blog\/tag\/2\/\">#2<\/a>: If a bad guy can alter the operating system on your computer, it&#8217;s not your computer anymore<br \/>\nLaw #3: If a bad guy has unrestricted physical access to your computer, it&#8217;s not your computer anymore<br \/>\nLaw #4: If you allow a bad guy to upload programs to your website, it&#8217;s not your website any more<br \/>\nLaw #5: Weak passwords trump strong security<br \/>\nLaw #6: A computer is only as secure as the administrator is trustworthy<br \/>\nLaw #7: Encrypted data is only as secure as the decryption key<br \/>\nLaw #8: An out of date virus scanner is only marginally better than no virus scanner at all<br \/>\nLaw #9: Absolute anonymity isn&#8217;t practical, in real life or on the Web<br \/>\nLaw #10: Technology is not a panacea<\/p>\n<p>I agree with all of them and have found them to be true at various  times&#8230;<\/p>\n<p>Original located at: <a href=\"http:\/\/www.microsoft.com\/technet\/archive\/community\/columns\/security\/essays\/10imlaws.mspx\">MicroSoft TechNet<\/a><\/p>\n<p>&#8211; Suramya<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Found these on the Microsoft TechNet website. Found them to be true so decided to share them with you all: Law #1: If a bad guy can persuade you to run his program on your computer, it&#8217;s not your computer anymore Law #2: If a bad guy can alter the operating system on your computer, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[19,2],"tags":[],"class_list":["post-122","post","type-post","status-publish","format-standard","hentry","category-computer-security","category-techie-stuff"],"_links":{"self":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/comments?post=122"}],"version-history":[{"count":1,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/122\/revisions"}],"predecessor-version":[{"id":5028,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/122\/revisions\/5028"}],"wp:attachment":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/media?parent=122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/categories?post=122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/tags?post=122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}