Abstract
Any security process should always have one last phase that monitors the efficiency of the implemented practices. This phase creates the feedback loop that regulates any deficiency or inefficiency of the security process. The quality and probity of this last phase have a strong influence on the overall robustness of the security.
Muffley : General Turgidson, I find this very difficult to understand. I was under the impression that I was the only one in authority to order the use of nuclear weapons.
Turgidson : That’s right sir. You are the only person authorized to do so. And although I hate to judge before all the facts are in, it’s beginning to look like General Ripper exceeded his authority.
Dr. Strangelove [381]
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The current reward is 25 bitcoins. This reward is halved about every 2Â years. Nevertheless, there is a fee associated with each validated transaction.
- 2.
This maxim is attributed to Philip II of Macedon (third century BC).
- 3.
For instance, the value of the financial grades delivered by credit rating agencies such as Fitch Ratings, Moody's and Standard and Poor’s are sometimes questioned. The financial institutions that a credit rating agency grades also pay for the grading.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Diehl, E. (2016). Law 9: Quis Custodiet Ipsos Custodes?. In: Ten Laws for Security. Springer, Cham. https://doi.org/10.1007/978-3-319-42641-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-42641-9_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42639-6
Online ISBN: 978-3-319-42641-9
eBook Packages: Computer ScienceComputer Science (R0)