spelling

master
Jos Verlinde 2024-01-17 12:18:12 +01:00
rodzic b49eb82ea9
commit 0df961cabb
1 zmienionych plików z 2 dodań i 1 usunięć

@ -1,7 +1,8 @@
There are many ways to, and degrees of securing any computer system, and most of the options to improve security also have some sort of a downside. Either in speed, complexity to build, distribute or use the software, or in increased requirements to the hardware platform your solution needs to run on.
## Threat assessment and modeling
In order to be able to make a good or appropriate selection from the menu of security controls that you could apply, you will need to define what you want, or need, to secure against. After you know in enough detail the risks to secure against, only then you can start to apply the security controls to reduce that risk to a kevel that you or your users find acceptable.
In order to be able to make a good or appropriate selection from the menu of security controls that you could apply, you will need to define what you want, or need, to secure against. After you know in enough detail the risks to secure against, only then you can start to apply the security controls to reduce that risk to a level that you or your users find acceptable.
Compare this to real life: you probably want you bank's vault to have a better lock than your toolshed doors.
While it is possible to do this on intuition, it can be difficult as often you need to think alternately as an attacker and as a defender.