This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Fratricide
May/June 2010 (vol. 8 no. 3)
pp. 88, 87
When you deploy a new security tool, throw one away. If the new one is particularly invasive, then throw two away. Do what you can to drive your mean time to repair toward zero—the more powerful your security tools, the more collateral damage when they collide and the faster your recovery must be to avoid availability failures.
Index Terms:
Security, complexity, cyberwar, software
Citation:
Daniel E. Geer Jr., "Fratricide," IEEE Security & Privacy, vol. 8, no. 3, pp. 88, 87, May-June 2010, doi:10.1109/MSP.2010.97
Usage of this product signifies your acceptance of the Terms of Use.