Category Archives: Security

General Systems Security and Security Architecture

The Ying & Yang of Systems Security Engineering

Overview Systems Security Engineering is Systems Engineering. Like any other engineered system, a security system will follow a certain workflow as it progresses from concept through to deployment. These include architectural development, design, ¬†implementation, design verification and validation. This is … Continue reading

Posted in Pentesting, Security, Systems Engineering | Leave a comment

2016 Personal Security Recommendations

Overview There are millions of criminals on the Internet and billions of potential victims. You have probably not been attacked or compromised and if so, it is due to the numbers – probably not your personal security habits. I have … Continue reading

Posted in Internet Security, Security, Systems Engineering | Leave a comment

IOT and Stuff – The Evolution

Overview This is the first of several posts I expect to do on IoT, including systems design, authentication, standards, and security domains. This particular post is an IoT backgrounder from my subjective viewpoint. Introduction The Internet of Things (IoT) is … Continue reading

Posted in Arduino, Internet Security, Systems Engineering | Tagged , | Leave a comment

A Brief Introduction to Security Engineering

Background One of the great myths is that security is complicated, hard to understand, and must be opaque to be effective. This is mostly fiction perpetrated by people who would rather you did not question the security theater they are … Continue reading

Posted in Internet Security, Security, Systems Engineering | Tagged , , , , | Leave a comment

Software: Thoughts on Reliability and Randomness

Overview Software Reliability and Randomness are slippery concepts that may be conceptually easy to understand, but hard to pin down. As programmers, we can write the equivalent of ‘hello world’ in dozens of languages on hundreds of platforms and once … Continue reading

Posted in Security, Systems Engineering | Tagged , , | Leave a comment

Howto: Browse (more) Securely / Privately / Anonymously

Background For a number of reasons, many people are increasingly concerned with their privacy and security on the Internet. Since the primary reason most people use the Internet is for browsing, this would be a opportunistic use model to look … Continue reading

Posted in Internet Security, Security, Uncategorized | Tagged , , , , | Leave a comment

Howto: Share Files Securely/Privately

Background The joint concepts of Secure and Private are relative and subjective. Relative in that there are very few absolutes, but there are an infinite number of variations that may be better or worse. Qualifying “better or worse” is where … Continue reading

Posted in Internet Security, Security | Tagged , , , , , , | Leave a comment