4 Ways Terrorist Profiling is Like Antivirus

January 18, 2010
screen-shot-2014-12-14-at-11.07.35-am
  1. Both can be bypassed by smart attackers who know they’re being profiled.

  2. Both have moderate success in catching less-dedicated attackers.

  3. You shouldn’t think either is a defense by itself.

  4. Despite their weaknesses, they are still an essential part of a security program.

In other words, both security layers are worthwhile, but they both also become dangerous when their effectiveness is overestimated. ::

supporting = loving

For 29.432 years I've been creating ad-free technical tutorials and essays here — 3,027 pieces and counting. It's a one-person effort that's also my life and livelihood. If it makes your day more livable in any way, please consider supporting the work with a monthly or one-time donation. Your support means a lot to me, and makes all the difference. 🫶🏼