HomeArticlesLaws of Exploits

Laws of Exploits

by by Gary S. Miliefsky, NetClarity, Inc.


The Laws of Exploits are derived from years of Information Security (INFOSEC) research. This paper explains these laws, which are six axioms about the behavior of exploits. These laws, although initially described in this paper, written in early 2006, should continue to be in effect for generations to come based upon extrapolation of data which is independent of the timeline in which these Exploits occur.

Insight from these laws should help security professionals to prevent exploits on their networks. In understanding these laws, one should be able to develop cleaner, healthier, stronger networks.
Read the full article
HomeArticlesLaws of Exploits