Skip to Main Content
A fundamental fact in computer and network security is the impossibility of 100 percent assurance that a computer system is trusted. By trusted, we mean that the system always operates as expected by design and policy. For more than 25 years, the security community has focused on technology to solve these problems, yet information systems remain as vulnerable. Given the difficulties of developing software without potential vulnerabilities, we must develop best practices for "penetrate and patch" cycles and configuration management procedures.