I find this section of linked article interesting”
Rather, security issues arise when an unanticipated rare occurrence — say, an exceptionally large input, a file which is corrupted, or a network connection which is closed at exactly the wrong time….”
I would say that most security issues are not related at all to rare occurrences to but relativity well known occurrences ( or vulnerabilities if you will), that the system architect was unaware of.
Auditing & following best practices can help with this, but it still helps to have some with a “security” mind to do the once over on a particular issue.
I find this section of linked article interesting”
Rather, security issues arise when an unanticipated rare occurrence — say, an exceptionally large input, a file which is corrupted, or a network connection which is closed at exactly the wrong time….”
I would say that most security issues are not related at all to rare occurrences to but relativity well known occurrences ( or vulnerabilities if you will), that the system architect was unaware of.
Auditing & following best practices can help with this, but it still helps to have some with a “security” mind to do the once over on a particular issue.