Security Tradeoff

Nothing is free. When we opened our computers up to networks, we developed the need to secure our transmissions. When we started carrying phones and laptops, we developed the need to secure our devices from unauthorized access. Loosely speaking, security always costs us convenience. Encryption takes up processing time and resources at the sender and

What is “The Cloud”?

What is the cloud? I imagine that if you ask a hundred people, you'll get a hundred different answers to the question. Believe it or not, the cloud isn't hard to understand. The Cloud is Someone Else's Computer Once upon a time, when computers were expensive and large machines that filled entire rooms, no one really

Two Basic Security Attacks

We've talked a lot about techniques for preventing common attacks on our data, but fairly little about the attacks themselves. If t weren't for attacks, of course we wouldn't even need encryption. Passive Attacks The first kind of attack leaves absolutely no trace, because the attacker isn't actually touching a target computer. In the passive attack,

Basic Security – It’s an input thing

If I were to ask you what the most common type of hack is, you'd probably guess something like SSL Injection, or Buffer Overflow, or something of that nature. You wouldn't be entirely wrong, but there's a much more general answer that covers all those things: The most common attack is bad input When it boils