SlideShare uma empresa Scribd logo
1 de 3
Journal of Physical Security 13(1), 2-4 (2020)
2
Viewpoint Paper
Security Assurance*
Roger G. Johnston, Ph.D., CPP
http://rbsekurity.com
If you lookfor truth, you may find comfortin the end; if you lookfor
comfortyouwill get neither truth nor comfortā€¦only softsoap and
wishful thinking to begin, and in the end, despair.
-- C.S. Lewis (1898-1963)
Security Assurance is gaining confidence that our security has a good probability of handling
the threats we face, and that we are not wasting money in doing so.
I would argue that Security Assurance is something that often must be provided to stake-
holders (including taxpayers) and the organizationā€™s leadership, but should not be part of a
security program or security strategy per se. Confidence in security is always over-confidence,
if not arrogance and complacency. I donā€™t want security managers and others who provide
security to be assured; I want them to be sweating bullets. That is simply the dismal nature of
Security. The old adage has it right: ā€œIf you are happy with your security, so are the bad guys.ā€
Security managers and security programs should seek to optimize their security through
prudent Risk Management, but they should not seek dubious comfort from bogus confirmation
that everything is swell. Do a good job with the Risk Management on a continuing basis, and
you have done all you can do to have good security. Forget about the assurance part.
Good Risk Management requires, among other things, data inputs from Vulnerability
Assessments (which are often missing [1]); Threat Assessments; and Risk Assessments; along
with information about the organizationā€™s budget, resources, and appetite for risk; the assets
needing protection; and the possible long- and short-term consequences of security failures.
Good Risk Management also requires sound judgement, prescience, an ability to balance
tradeoffs, prudent value judgements, objective and quantitative analysis, subjective and
qualitative analysis, and the ability to leverage hunches and sound intuition. I personally
believe it should also include something like Marginal Analysis [1].
________
*This paper was not peer reviewed.
Journal of Physical Security 13(1), 2-4 (2020)
3
Now it must be said that the need to provide ā€œassuranceā€ to stakeholders and organizational
leaders is largely unavoidable. This is, however, more about marketing/fund-raising, public
relations, educating stakeholders about security issues, and making return-on-investment (ROI)
arguments than it is about security per se. Certainly the stakeholders (being security amateurs)
can be provided with a simplified discussion of the Risk Management that has been under-
taken, and why certain decisions were made based on recognized threats, vulnerabilities, attack
scenarios, and possible consequences of attacks. High-level executives can be warned about
what happened to other organizations and their executives when the organizations were
attacked and lacked adequate security measures.
Two caveats here, however. Firstly, ROIā€”arguing that security expenditure returns valueā€”
has proven to be very ineffective. High-level corporate and government executives are often
highly unimaginative, or else quite willing to live with substantial security risk for the few years
they have left before retiring, being fired, or moving to a more prestigious position elsewhere.
The odds are that the bad security incidents being envisioned wonā€™t happen on their watch.
Even if they do, there are plenty of scapegoats that can be named, including the CSO, CISO, and
lower-level people. Better to increase corporate profitability, the executives may reason, at
least from the standpoint of their personal interests and reputation.
The second caveat is that scaring executives about bad consequences of potential security
failures or actual failures that happened elsewhere can work, but crying wolf too many times
undercuts its effectiveness.
One thing that is crystal-clear about Security Assurance is that it must never be based on the
results of Vulnerability Assessments (VAs). If it is, there will be enormous pressure (conscious
and unconscious) to not find vulnerabilities in order to gain a false sense of security. This will
result in both bad VAs and bad security.
For similar reasons, security testing must never be used for Security Assurance. (Note that
Security Testing is NOT the same thing as Vulnerability Assessments.[1]). We learn the most
from Security Tests when we fail them, but if they are the source of confidence in our security,
the tests will most likely no longer be made relevant or challenging. Moreover, we canā€™t really
test what we have not envisionedā€”thus the need for imaginative, proactive VAs where we
think like the bad guys. Testing also has other serious limitations such as the difficulty of
making the tests realistic, and the fact that testing can look at only a small fraction of the
possible vulnerabilities, attack scenarios, and countermeasures that an imaginative VA can
uncover.
In my view, Security Testing should mostly be for practice and to keep front-line security
personnel entertained and engaged. Tests can help us somewhat understand our
vulnerabilities, but they are not nearly as effective at this as a good Vulnerability Assessment.
Journal of Physical Security 13(1), 2-4 (2020)
4
In summary, I think we need to worry less about Security Assurance and do a better job with
Risk Management, including doing more and better Vulnerability Assessments. We also need
to avoid confusing VAs with other techniques that are not as good at uncovering vulnerabilities,
attacks scenarios, and possible countermeasures.
References
1. RG Johnston, Vulnerability Assessment: The Missing Manual for the Missing Link,
https://www.amazon.com/dp/B08C9D73Z9

Mais conteĆŗdo relacionado

Mais procurados

Insurance risk mgmnt
Insurance risk mgmntInsurance risk mgmnt
Insurance risk mgmnt
Dr. Ravneet Kaur
Ā 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
Samuel Loomis
Ā 

Mais procurados (19)

Compliance vs Security
Compliance vs SecurityCompliance vs Security
Compliance vs Security
Ā 
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martin
Ā 
Sensible defence
Sensible defenceSensible defence
Sensible defence
Ā 
Risk Management Infographic
Risk Management InfographicRisk Management Infographic
Risk Management Infographic
Ā 
Insurance risk mgmnt
Insurance risk mgmntInsurance risk mgmnt
Insurance risk mgmnt
Ā 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
Ā 
Unconventional Security Metrics & Marginal Analysis
Unconventional Security Metrics & Marginal AnalysisUnconventional Security Metrics & Marginal Analysis
Unconventional Security Metrics & Marginal Analysis
Ā 
Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
Ā 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
Ā 
Executive Travel, Keeping Your Employees Safe
Executive Travel, Keeping Your Employees SafeExecutive Travel, Keeping Your Employees Safe
Executive Travel, Keeping Your Employees Safe
Ā 
Planning a move from Perspective to CORE
Planning a move from Perspective to COREPlanning a move from Perspective to CORE
Planning a move from Perspective to CORE
Ā 
Rcs webinar 1 2011_06_23
Rcs webinar 1 2011_06_23Rcs webinar 1 2011_06_23
Rcs webinar 1 2011_06_23
Ā 
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Creating an Enterprise-Wide Workplace Violence & Threat Assessment TeamCreating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Ā 
The Cio And Crisis Leadership, An Examination
The Cio And Crisis Leadership, An ExaminationThe Cio And Crisis Leadership, An Examination
The Cio And Crisis Leadership, An Examination
Ā 
Risk Budgeting & Manager Allocation
Risk Budgeting  & Manager AllocationRisk Budgeting  & Manager Allocation
Risk Budgeting & Manager Allocation
Ā 
CyberSecurity Automation
CyberSecurity AutomationCyberSecurity Automation
CyberSecurity Automation
Ā 
Managing Reputation
Managing ReputationManaging Reputation
Managing Reputation
Ā 
Risk Equation
Risk EquationRisk Equation
Risk Equation
Ā 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
Ā 

Semelhante a Security Assurance

THE UNITED STATES NAVAL WAR COLLEGE U.S. Navy.docx
THE UNITED STATES NAVAL WAR COLLEGE  U.S. Navy.docxTHE UNITED STATES NAVAL WAR COLLEGE  U.S. Navy.docx
THE UNITED STATES NAVAL WAR COLLEGE U.S. Navy.docx
arnoldmeredith47041
Ā 
answer original forum with a minimum of 500 words and respond to bot.docx
answer original forum with a minimum of 500 words and respond to bot.docxanswer original forum with a minimum of 500 words and respond to bot.docx
answer original forum with a minimum of 500 words and respond to bot.docx
YASHU40
Ā 
The Storms A Coming Risk Management
The Storms A Coming   Risk ManagementThe Storms A Coming   Risk Management
The Storms A Coming Risk Management
travismcmurray
Ā 
cybersecurity-series-2019-threat-hunting.pdf
cybersecurity-series-2019-threat-hunting.pdfcybersecurity-series-2019-threat-hunting.pdf
cybersecurity-series-2019-threat-hunting.pdf
CecilSu
Ā 
Uncertainty short
Uncertainty shortUncertainty short
Uncertainty short
Mo Aiken
Ā 
4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx
gilbertkpeters11344
Ā 
speaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaperspeaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaper
Bilha Diaz
Ā 

Semelhante a Security Assurance (20)

Wisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LGWisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LG
Ā 
Convergence of Security Risks
Convergence of Security RisksConvergence of Security Risks
Convergence of Security Risks
Ā 
Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
Ā 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
Ā 
THE UNITED STATES NAVAL WAR COLLEGE U.S. Navy.docx
THE UNITED STATES NAVAL WAR COLLEGE  U.S. Navy.docxTHE UNITED STATES NAVAL WAR COLLEGE  U.S. Navy.docx
THE UNITED STATES NAVAL WAR COLLEGE U.S. Navy.docx
Ā 
answer original forum with a minimum of 500 words and respond to bot.docx
answer original forum with a minimum of 500 words and respond to bot.docxanswer original forum with a minimum of 500 words and respond to bot.docx
answer original forum with a minimum of 500 words and respond to bot.docx
Ā 
ERM -01- Introduction 06-10-2022.pptx
ERM -01- Introduction 06-10-2022.pptxERM -01- Introduction 06-10-2022.pptx
ERM -01- Introduction 06-10-2022.pptx
Ā 
Trust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology RiskTrust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology Risk
Ā 
The Storms A Coming Risk Management
The Storms A Coming   Risk ManagementThe Storms A Coming   Risk Management
The Storms A Coming Risk Management
Ā 
TRUST: DIFFERENT VIEWS, ONE GOAL
TRUST: DIFFERENT VIEWS, ONE GOALTRUST: DIFFERENT VIEWS, ONE GOAL
TRUST: DIFFERENT VIEWS, ONE GOAL
Ā 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
Ā 
cybersecurity-series-2019-threat-hunting.pdf
cybersecurity-series-2019-threat-hunting.pdfcybersecurity-series-2019-threat-hunting.pdf
cybersecurity-series-2019-threat-hunting.pdf
Ā 
Basic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionBasic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 Edition
Ā 
Improving Healthcare Risk Assessments to Maximize Security Budgets
Improving Healthcare Risk Assessments to Maximize Security BudgetsImproving Healthcare Risk Assessments to Maximize Security Budgets
Improving Healthcare Risk Assessments to Maximize Security Budgets
Ā 
Security risk
Security riskSecurity risk
Security risk
Ā 
Uncertainty short
Uncertainty shortUncertainty short
Uncertainty short
Ā 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical Security
Ā 
Carrot or stick? - How culture shapes organizational safety
Carrot or stick? - How culture shapes organizational safetyCarrot or stick? - How culture shapes organizational safety
Carrot or stick? - How culture shapes organizational safety
Ā 
4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx
Ā 
speaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaperspeaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaper
Ā 

Mais de Roger Johnston

Mais de Roger Johnston (20)

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & Security
Ā 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)
Ā 
Security Audits.pdf
Security Audits.pdfSecurity Audits.pdf
Security Audits.pdf
Ā 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/Privacy
Ā 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link
Ā 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)
Ā 
Want seals with that?
Want seals with that?Want seals with that?
Want seals with that?
Ā 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)
Ā 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020
Ā 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability Assessment
Ā 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability Assessments
Ā 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms
Ā 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments
Ā 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)
Ā 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)
Ā 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security Devices
Ā 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)
Ā 
Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Journal of Physical Security 10(1)
Journal of Physical Security 10(1)
Ā 
How to Remove Voter's Ink
How to Remove Voter's Ink How to Remove Voter's Ink
How to Remove Voter's Ink
Ā 
Common Security Reasoning Errors
Common Security Reasoning ErrorsCommon Security Reasoning Errors
Common Security Reasoning Errors
Ā 

ƚltimo

RussianšŸŒDazzling Hottie Getā˜Žļø 9053900678 ā˜Žļøcall girl In Chandigarh By Chandig...
RussianšŸŒDazzling Hottie Getā˜Žļø 9053900678 ā˜Žļøcall girl In Chandigarh By Chandig...RussianšŸŒDazzling Hottie Getā˜Žļø 9053900678 ā˜Žļøcall girl In Chandigarh By Chandig...
RussianšŸŒDazzling Hottie Getā˜Žļø 9053900678 ā˜Žļøcall girl In Chandigarh By Chandig...
Chandigarh Call girls 9053900678 Call girls in Chandigarh
Ā 
call girls in Raghubir Nagar (DELHI) šŸ” >ą¼’9953056974 šŸ” genuine Escort Service ...
call girls in Raghubir Nagar (DELHI) šŸ” >ą¼’9953056974 šŸ” genuine Escort Service ...call girls in Raghubir Nagar (DELHI) šŸ” >ą¼’9953056974 šŸ” genuine Escort Service ...
call girls in Raghubir Nagar (DELHI) šŸ” >ą¼’9953056974 šŸ” genuine Escort Service ...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
Call Girls In datia Escorts ā˜Žļø7427069034 šŸ” šŸ’ƒ Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ā˜Žļø7427069034  šŸ” šŸ’ƒ Enjoy 24/7 Escort Service Enjoy...Call Girls In datia Escorts ā˜Žļø7427069034  šŸ” šŸ’ƒ Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ā˜Žļø7427069034 šŸ” šŸ’ƒ Enjoy 24/7 Escort Service Enjoy...
nehasharma67844
Ā 
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
Ā 
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
SUHANI PANDEY
Ā 
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
SUHANI PANDEY
Ā 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
SUHANI PANDEY
Ā 
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
SUHANI PANDEY
Ā 

ƚltimo (20)

RussianšŸŒDazzling Hottie Getā˜Žļø 9053900678 ā˜Žļøcall girl In Chandigarh By Chandig...
RussianšŸŒDazzling Hottie Getā˜Žļø 9053900678 ā˜Žļøcall girl In Chandigarh By Chandig...RussianšŸŒDazzling Hottie Getā˜Žļø 9053900678 ā˜Žļøcall girl In Chandigarh By Chandig...
RussianšŸŒDazzling Hottie Getā˜Žļø 9053900678 ā˜Žļøcall girl In Chandigarh By Chandig...
Ā 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
Ā 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Ā 
call girls in Raghubir Nagar (DELHI) šŸ” >ą¼’9953056974 šŸ” genuine Escort Service ...
call girls in Raghubir Nagar (DELHI) šŸ” >ą¼’9953056974 šŸ” genuine Escort Service ...call girls in Raghubir Nagar (DELHI) šŸ” >ą¼’9953056974 šŸ” genuine Escort Service ...
call girls in Raghubir Nagar (DELHI) šŸ” >ą¼’9953056974 šŸ” genuine Escort Service ...
Ā 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
Ā 
Call Girls In datia Escorts ā˜Žļø7427069034 šŸ” šŸ’ƒ Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ā˜Žļø7427069034  šŸ” šŸ’ƒ Enjoy 24/7 Escort Service Enjoy...Call Girls In datia Escorts ā˜Žļø7427069034  šŸ” šŸ’ƒ Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ā˜Žļø7427069034 šŸ” šŸ’ƒ Enjoy 24/7 Escort Service Enjoy...
Ā 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Ā 
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
Ā 
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Ā 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
Ā 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
Ā 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Ā 
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
Ā 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
Ā 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
Ā 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
Ā 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
Ā 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
Ā 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
Ā 
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
Ā 

Security Assurance

  • 1. Journal of Physical Security 13(1), 2-4 (2020) 2 Viewpoint Paper Security Assurance* Roger G. Johnston, Ph.D., CPP http://rbsekurity.com If you lookfor truth, you may find comfortin the end; if you lookfor comfortyouwill get neither truth nor comfortā€¦only softsoap and wishful thinking to begin, and in the end, despair. -- C.S. Lewis (1898-1963) Security Assurance is gaining confidence that our security has a good probability of handling the threats we face, and that we are not wasting money in doing so. I would argue that Security Assurance is something that often must be provided to stake- holders (including taxpayers) and the organizationā€™s leadership, but should not be part of a security program or security strategy per se. Confidence in security is always over-confidence, if not arrogance and complacency. I donā€™t want security managers and others who provide security to be assured; I want them to be sweating bullets. That is simply the dismal nature of Security. The old adage has it right: ā€œIf you are happy with your security, so are the bad guys.ā€ Security managers and security programs should seek to optimize their security through prudent Risk Management, but they should not seek dubious comfort from bogus confirmation that everything is swell. Do a good job with the Risk Management on a continuing basis, and you have done all you can do to have good security. Forget about the assurance part. Good Risk Management requires, among other things, data inputs from Vulnerability Assessments (which are often missing [1]); Threat Assessments; and Risk Assessments; along with information about the organizationā€™s budget, resources, and appetite for risk; the assets needing protection; and the possible long- and short-term consequences of security failures. Good Risk Management also requires sound judgement, prescience, an ability to balance tradeoffs, prudent value judgements, objective and quantitative analysis, subjective and qualitative analysis, and the ability to leverage hunches and sound intuition. I personally believe it should also include something like Marginal Analysis [1]. ________ *This paper was not peer reviewed.
  • 2. Journal of Physical Security 13(1), 2-4 (2020) 3 Now it must be said that the need to provide ā€œassuranceā€ to stakeholders and organizational leaders is largely unavoidable. This is, however, more about marketing/fund-raising, public relations, educating stakeholders about security issues, and making return-on-investment (ROI) arguments than it is about security per se. Certainly the stakeholders (being security amateurs) can be provided with a simplified discussion of the Risk Management that has been under- taken, and why certain decisions were made based on recognized threats, vulnerabilities, attack scenarios, and possible consequences of attacks. High-level executives can be warned about what happened to other organizations and their executives when the organizations were attacked and lacked adequate security measures. Two caveats here, however. Firstly, ROIā€”arguing that security expenditure returns valueā€” has proven to be very ineffective. High-level corporate and government executives are often highly unimaginative, or else quite willing to live with substantial security risk for the few years they have left before retiring, being fired, or moving to a more prestigious position elsewhere. The odds are that the bad security incidents being envisioned wonā€™t happen on their watch. Even if they do, there are plenty of scapegoats that can be named, including the CSO, CISO, and lower-level people. Better to increase corporate profitability, the executives may reason, at least from the standpoint of their personal interests and reputation. The second caveat is that scaring executives about bad consequences of potential security failures or actual failures that happened elsewhere can work, but crying wolf too many times undercuts its effectiveness. One thing that is crystal-clear about Security Assurance is that it must never be based on the results of Vulnerability Assessments (VAs). If it is, there will be enormous pressure (conscious and unconscious) to not find vulnerabilities in order to gain a false sense of security. This will result in both bad VAs and bad security. For similar reasons, security testing must never be used for Security Assurance. (Note that Security Testing is NOT the same thing as Vulnerability Assessments.[1]). We learn the most from Security Tests when we fail them, but if they are the source of confidence in our security, the tests will most likely no longer be made relevant or challenging. Moreover, we canā€™t really test what we have not envisionedā€”thus the need for imaginative, proactive VAs where we think like the bad guys. Testing also has other serious limitations such as the difficulty of making the tests realistic, and the fact that testing can look at only a small fraction of the possible vulnerabilities, attack scenarios, and countermeasures that an imaginative VA can uncover. In my view, Security Testing should mostly be for practice and to keep front-line security personnel entertained and engaged. Tests can help us somewhat understand our vulnerabilities, but they are not nearly as effective at this as a good Vulnerability Assessment.
  • 3. Journal of Physical Security 13(1), 2-4 (2020) 4 In summary, I think we need to worry less about Security Assurance and do a better job with Risk Management, including doing more and better Vulnerability Assessments. We also need to avoid confusing VAs with other techniques that are not as good at uncovering vulnerabilities, attacks scenarios, and possible countermeasures. References 1. RG Johnston, Vulnerability Assessment: The Missing Manual for the Missing Link, https://www.amazon.com/dp/B08C9D73Z9