The Triangle of Security is a common way to communicate the trade-off of security, ease of use, and functionality. The modified Travel Triangle of Security builds off the same concept, putting emphasis on convenience and mobility. Success is finding that middle ground. Adapting the formula as technology and threats change will lead to long term success.
- [Instructor] Visualizing concepts is pretty important, especially to us visual learners. There are many ways to visualize security to include Venn diagrams, pie charts, etc. I like triangles. Because we are talking about security and travel, I decided to name this triangle the travel triangle of security. The triangle of security is a common way to communicate the trade-off of security, ease of use, and functionality. The bigger problem with security and computers is that the more secure they are, the less functionality they provide.
The more secure they are, the harder they are to use. Finding that middle ground is what will be successful. Adapting the formula as technology and threats change will lead to long-term success. However, I'm not certain it should actually be a triangle. A system could be too secure to where it is no longer easy to use at all. For example, self-destructing mail. A system can have so much functionality, there is no way to really secure it. For example, a park.
A system can be so easy to use, it has no functionality. For example, pet rocks. Maybe it should be a diagram like this. Not really a triangle at all. These things can be mutually inclusive or mutually exclusive. More of a sweet spot type concept. With a travel aspect, there are some other perspectives that need to be taken to account. These translate fairly well though. Ease of use turns into convenience.
While things still need to be easy to use, time seems to be more of a key feature. Functionality turns into mobility. Instead of more features, the system has to be portable enough to go into any environment. Security stays security. Actually, let's take a closer look at security.
Note: This course was recorded and produced by Mentor Source, Inc. We're pleased to host this training in our library.
- Balancing security, convenience, and mobility
- Working in wireless and wired situations
- Avoiding common threats
- Enabling firewalls
- Setting up a VPN and router