RSA Secure ID vulnerability

Like erstwhile forts, security relies upon defense in depth and also upon the security of other infrastructure elements, that a particular service depends on. If the crocodiles in the moat around the fort die, then you have a vulnerability that can compromise the security of the fort. Therefore, this item http://news.cnet.com/8301-1009_3-20044775-83.html?tag=nl.e757 illustrates a key element, that a core component’s security is reliant upon the security of other components that support it.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s