1998-08-12 - RE: Internet is rickety

Header Data

From: “Brown, R Ken” <brownrk1@texaco.com>
To: vznuri@netcom.com>
Message Hash: a1aeb68620956a00d58efd7abdb6a6499cd9d6cbdd70e85ca88ccdb9352ccc63
Message ID: <896C7C3540C3D111AB9F00805FA78CE2013F833B@MSX11002>
Reply To: N/A
UTC Datetime: 1998-08-12 09:51:53 UTC
Raw Date: Wed, 12 Aug 1998 02:51:53 -0700 (PDT)

Raw message

From: "Brown, R Ken" <brownrk1@texaco.com>
Date: Wed, 12 Aug 1998 02:51:53 -0700 (PDT)
To: vznuri@netcom.com>
Subject: RE: Internet is rickety
Message-ID: <896C7C3540C3D111AB9F00805FA78CE2013F833B@MSX11002>
MIME-Version: 1.0
Content-Type: text/plain

Vladimir Z. Nuri[SMTP:vznuri@netcom.com] wrote

> MG: it's a question: do you imlement security top 
> down, or bottom up? which is the top? the internet, 
> or the computer?
> it's very taoist-- I don't think there is a correct answer.

You implement security on the systems in which you
have an interest. If you run a large email server you secure
that. If you don't want people to read what's on your
own PC, you secure that. If we all look after what's in 
our own hands it will all work.

But remember the old rules of thumb of