From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: * X-Spam-Status: No, score=1.3 required=5.0 tests=BAYES_50,FAKE_REPLY_C, MAILING_LIST_MULTI autolearn=unavailable autolearn_force=no version=3.4.4 X-Google-Thread: 103376,b95a522100671708 X-Google-Attributes: gid103376,public X-Google-Language: ENGLISH,ASCII-7-bit Path: g2news1.google.com!news1.google.com!news.maxwell.syr.edu!newsfeed.icl.net!newsfeed.fjserv.net!oleane.net!oleane!teaser.fr!enst.fr!melchior!cuivre.fr.eu.org!melchior.frmug.org!not-for-mail From: Mike Brenner Newsgroups: comp.lang.ada Subject: Re: For the AdaOS folks Date: Wed, 05 Jan 2005 07:14:48 -0500 Organization: none Message-ID: NNTP-Posting-Host: lovelace.ada-france.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Trace: melchior.cuivre.fr.eu.org 1104927355 27648 212.85.156.195 (5 Jan 2005 12:15:55 GMT) X-Complaints-To: usenet@melchior.cuivre.fr.eu.org NNTP-Posting-Date: Wed, 5 Jan 2005 12:15:55 +0000 (UTC) To: comp.lang.ada@ada-france.org Return-Path: X-Mailer: Mozilla 4.79 [en]C-20020130M (Windows NT 5.0; U) X-Accept-Language: en X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at ada-france.org X-BeenThere: comp.lang.ada@ada-france.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Gateway to the comp.lang.ada Usenet newsgroup" List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Xref: g2news1.google.com comp.lang.ada:7471 Date: 2005-01-05T07:14:48-05:00 >>If you are a night watchman for a Mall, which situation makes it >>easier to sleep at night when you've locked up and gone home? >> >> 1. A mall with one or two doors on the outside to be >> locked and checked. >> 2. A mall with thousands of doors on the outside to be >> locked and checked. >> >>The answer is obvious. ... It is not obvious to me, especially in an environment where it is NOT possible to fully secure anything (like on a computer network). In such environments, rules like: "The network shall not fail when up to 5 computers are compromised with viruses, up to 30 computers are compromised with trojan horses, up to 50,000 computers are participating in a denial of service attack, and category T information shall retain its privacy and integrity even under quantum computer attack." In such environments, the lower levels of security serve as layers (and honey pots) so that break ins do not kill the network itself or the highest layer of secure data. At its simplest is the rule of thumb: "The network (passwords, privacy, logins, and T information) shall survive the capture of any one computer." Therefore, I think the answer is not obvious, although part of the answer is that the more doorways there are, and the more layers of doorways there are, then the easier it is to know when you are broken into, and the sooner you can respond. Not how similar this theory is to the propagation of Ada Exceptions. Mike Brenner