The Real Dynamics of Security

in security •  7 years ago  (edited)

Security as a concept is very complex. But, understanding its complexity at times becomes very relevant in devising pragmatic solutions to real security problems. Usually, security is regarded as something quite achievable, which is not the case. In reality, absolute security is almost impossible to achieve. In simple terms there is nothing as foolproof or fail-safe security. Which means, one can only raise the bar higher, clearly dictated by the availability of resources at hand.

Restraints & Moderation

Most of the time it is the lack of resources and sometimes, the availability of many options that make security a very hard task to handle. Therefore, limited resources restrain what is believed to be “complete” security, while, on the other hand abundant resources make security an unending and unsatisfactory enterprise. It is clearly evident that, in both the instances seekers of so called absolute security are left disappointed.    

The Right Approach

In this context, one may rightly ask as how to approach this delicate matter of security. To address this question it is essential to recognize security as an abstract term. A concept that is divided into infinite levels. Where every level is good security under specific conditions and resources. Now, a pragmatic security solution is where the conditions perfectly match the right security level. This is the stage where intense brainstorming is necessary to figure out the right balance between security needs, availability of resources and the right security level. 

The Right Balance

Here, the 'right security level' is the strategy that aims to tackle the security needs under specific conditions. Identifying all the variables, analyzing their inter-dependencies and drawing their impressions on the system are some of the essentials that shape the required security strategy.  

Ultimately, striking the right balance is the acme of skill when it comes to devising effective security strategies. On the flip side, ignoring this balance usually results in under security and over security. While under security obviously drives vulnerability, over security unnecessarily results in paranoia and exhaustion of precious resource.  

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Congratulations @wi09! You have completed some achievement on Steemit and have been rewarded with new badge(s) :

You published your First Post
You got a First Vote
You made your First Vote

Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here

If you no longer want to receive notifications, reply to this comment with the word STOP

By upvoting this notification, you can help all Steemit users. Learn how here!

Great article!

Nice post! I will follow you from now on.

Congratulations @wi09! You received a personal award!

Happy Birthday! - You are on the Steem blockchain for 2 years!

You can view your badges on your Steem Board and compare to others on the Steem Ranking

Vote for @Steemitboard as a witness to get one more award and increased upvotes!