-Advertisement-

20 Security Points To Fasten To Your Chest

Security is a tax on the honest.

Deterrence has a place, but prevention of crime is impossible.

All countermeasures are capable of failing.

We can take precautions than reasonable, spend more money than prudent, and suffer more trade-offs than normal, yet we can still be attacked.

Security is a game of mortal stakes.

It is a game with constantly changing rules.

The only way to deal with terrorists effectively is to detect their plots before they’re implemented, then counterattack, and go after them.

Terror is rare, crime is common.

Your security largely depends on the actions of others and the environment you are in.

Just because anomalies happen doesn’t mean security has failed.

The more prominent you are – person, organization, or government – the more likely you are to attract targeted attacks, especially if you are suddenly thrust into the limelight.

A security camera peers down from the corner of the building, watching your every move.

 

Criminals and terrorists don’t believe in afterlife retribution so nothing deters them, they go all out.

There is an enormous difference between an attacker who is looking for any victim and an attacker who is targeting a specific one.

The possible attacks depend on the scope of assets you are defending.

Even if the police can’t secretly listen to your telephone conversations, phone records showing whom you call and how long you talk are available.

The internet has made fraud easier.

A Very Important Personality might sleep in a locked bedroom high in his keep, with castle walls, guards, and a moat to protect him, but none of that will prevent a trusted servant from poisoning his food. Close associates always find a way around well-protected personalities.

Criminals tend not to have good access, with the exception of those who are insiders.

Identity theft is also called impersonation. They are just semantics for an imposter.

The types of attacks are timeless because the motivations and objectives are constant. What does change is the nature of attacks: the tools, methods, and results.

 

 

 

 

 

 

 

 

 

 

 

Leave A Comment

Your email address will not be published.

You might also like