There is a silver bullet : learning.
Personal heuristics
- You don't need the best solution (which doesn't exist), only to make it too costly for your opponent.
- Know who you are dealing with, what is their motivation and how they enforce it. How fresh your information is will lead to efficient execution.
- only 2 solutions, trust or understand
See also
To do
- package in a single file (zip, pdf, word...) that can be shared outside of the wiki
- "send it to friends" link with several anonymous sharing means
- host in independent places
- Cookbook:ExportHTML
- else consider ikiwiki for its "wiki compiler" view
- understand better the why, not just the how
- consider doing a Security or Locks page
- principle/motivation
- one can behind a fence without being wrong
- locks do not imply lawfulness or even moral and ethical rightfulness
- understanding is only a mean to enforce one owns belief, not an end in itself
- learning and teaching process
- know how long your own locks will last against which set of resources
- means
- physical locks
- doors, walls, biology (immune system e.g. T-cell/B-cell/TCR/protein signature), padlocks, fingerprint lock, iris lock, ... Wikipedia:Category:Locks
- non-physical locks
- technological
- password, firewall, encryption, ...
- non-technological
- secrecy, social selection, law, induced fear, ...
- solutions
- judge picking, bribing, threatening, hijacking, ransoming, reverse engineering, intelligence, social engineering, discovering exploits, scanning for discovered exploits, privilege escalation, decryption, brute force, dictionary testing, penetration testing, delegated trust, hit&run, honeypot, man-in-the-middle, cryptanalysis, ...
- hybrids
- attack on the infrastructure (SCADA, a la Wikipedia:Stuxnet) has been used in conjunction with social engineering (fake associated tech. support) to finally reach information (final target)
- regarding integration, see also Metasploit and SCADA Exploits: Dawn of a New Era? by Shawn Merdinger, InfosecIsland November 2010
- SCADA – is this just the beginning?, IT Threat Evolution for Q1-2011, Securelist
- step back to understand the system as chain of sub-systems
- see also
- Feynman "problem" at Los Alamos
- The Code Book
- leveraging the other pages of this group