×
you are viewing a single comment's thread.

view the rest of the comments →

[–]kaxapi[S] 5 points6 points  (0 children)

  1. There are no scheduled events;

  2. There are no unplanned events;

  3. All nodes are similar in their hardware and software components;

  4. Failures are local and do not cascade to other nodes;

  5. The network is homogeneous;

  6. Treating the network as trusted is safe;

  7. The network has no hard real-time requirements;

  8. The cause of an outage exposes itself conveniently.

  9. The network is unimportant.

  10. The network is secure.

  11. The network is trustworthy.

  12. Extranets become intranets.

  13. The network is manageable.

  14. The internet is reliable.

  15. Computers never malfunction.

  16. State is preserved across soft restarts;

  17. Failures are not correlated;

  18. Redundancy is provided by multiple, independent components;

  19. Servers shut down cleanly;

  20. Servers are independent of each other;

  21. The network has infinite capacity;

  22. The system administrator has infinite bandwidth;

  23. The answers to questions can be predicted with certainty;

  24. Each component has infinite capacity;

  25. The system is loss less;

  26. The client is lossless;

  27. The transmission medium is infinite.

  28. The server administrator has infinite time;

  29. Transport latency does not limit or affect system performance;

  30. The network is secure;

  31. The entity on the other side of the firewall is your friend;

  32. The entity on the other side of the firewall is your enemy;

  33. The network is trustworthy;

  34. The network is managed.

  35. The network management system will work;

  36. The managed device is managed;

  37. The network management system will be implemented;

  38. The network management system will be modified;

  39. The network management system will be upgraded;

  40. The network management system is accurate, complete, and unambiguous;

  41. The network management system is available;

  42. The network management system can be used;

  43. The network management system can be modified;

  44. The network management system can be extended;

  45. The network management system is secure.

  46. The network administration system can be enforced;

  47. The network administration system is enforced;

  48. The network administration system is useful.

  49. The network is trustworthy.

  50. The network is managed.

  51. A sufficient number of skilled people will be available to make and maintain the network.

  52. Our fears won’t be realized;

  53. Spurious failures will not occur at the critical time

  54. The failures that will occur won’t be serious;

  55. The network performs as required by management;

62 . Security can be installed in the network;

  1. The network is secure;

  2. Security can be modified or changed;

  3. The security is convenient;

  4. The security is in place;

  5. The security we installed works;

  6. The security that we installed is convenient;

  7. The security that we installed is in place;

  8. The security that we installed is manageable;

  9. The next version of security will be manageable;

  10. The network is secure enough.

  11. Security is easy.

  12. Security could be managed;

  13. Security is useful.

  14. Security isn’t an issue.

  15. Security makes sense.

  16. We always act in the best interests of security .

  17. The security of the whole is less than the security of the few;

  18. The security of the whole is less than the security of the parts;

  19. The security of the whole is less than the security of the sum of the parts;

  20. The connectivity of the parts of the whole is always less than the connectivity of the whole;

  21. The security of the network is always less than the security of the systems in the network;