Dorothy Denning Quotes

Powerful Dorothy Denning for Daily Growth

About Dorothy Denning

Dorothy Denning, a distinguished scholar in the field of cybersecurity and computer science, was born on May 13, 1951, in the United States. After completing her undergraduate studies at Smith College, she earned a Ph.D. in Computer Science from the University of Michigan in 1980. Denning's academic journey took her to various prestigious institutions, including the Georgia Institute of Technology, the Naval Postgraduate School, and the University of Southern California. She is currently a Professor Emerita at the Naval Postgraduate School, where she served for over two decades. Denning is renowned for her contributions to computer security, cyber warfare, and information assurance. Her research focuses on the social and political aspects of these fields, as well as the development of effective policies and practices for cybersecurity. One of Denning's most influential works is "Information Warfare and Security: Threats, Actors, and Responses," published in 1999. This book provides a comprehensive overview of the complex issues surrounding information warfare and security, and remains a seminal text in the field. Denning's work has been recognized with numerous awards, including the IEEE Computer Society's Turing Award for Outstanding Achievements in Computer Science Research and the National Security Agency/Department of Defense Medal for Distinguished Public Service. In her spare time, Denning enjoys playing the piano and hiking. Her quotes reflect her deep commitment to understanding and addressing the challenges posed by cybersecurity: "Security is not a product or a project, it's a process," and "The most dangerous enemy of security is complacency." These insights continue to guide researchers and practitioners in the field.

Interpretations of Popular Quotes

"Security is not a product, but a process."

Dorothy Denning's quote emphasizes that security is not something you can simply buy or acquire, but rather it is an ongoing process. It suggests that achieving and maintaining security requires consistent effort and actions, not just the implementation of hardware or software solutions. This process may include regular updates, training employees, establishing policies, and monitoring systems for potential threats. In other words, true security demands a proactive approach that focuses on addressing risks over time, rather than relying solely on specific tools or technologies.


"Information assurance is the preservation of confidentiality, integrity, and availability of information systems."

Dorothy Denning's quote emphasizes the importance of maintaining the fundamental security principles in any information system - Confidentiality (ensuring sensitive data is accessible only to authorized individuals), Integrity (ensuring the data is accurate, complete, and trustworthy over its lifecycle), and Availability (making sure the data and systems are accessible when needed). Information Assurance encompasses the practices, policies, and technologies designed to defend against unauthorized access, modification, or disruption.


"In order to design secure systems, we must understand their threats, vulnerabilities, and risk."

This quote emphasizes that creating secure systems is not just about understanding the functionality and features, but also about recognizing the potential dangers (threats), identifying areas of weakness (vulnerabilities), and assessing the level of harm they can cause (risk). In other words, to build a secure system, one must have a thorough understanding of both the positive aspects (the system's design and capabilities) and the negative aspects (possible attacks and breaches).


"Trust is good, control is better, and both are needed for security."

Dorothy Denning's quote emphasizes that a balanced approach to ensuring security involves both trust and control. Trust, in this context, represents the reliance on others (e.g., colleagues, allies) to act with integrity and follow established norms or rules. Control, on the other hand, refers to the mechanisms put in place to verify compliance and mitigate risks, ensuring that actions align with established security policies and protocols. In essence, Denning suggests that an effective security strategy combines trust in others with rigorous controls to maintain a secure environment.


"Security is not an add-on; it must be designed in from the start."

This quote by Dorothy Denning emphasizes that security should not be considered as an afterthought or additional feature, but rather a fundamental part of the design process from the very beginning. In other words, security is integral to the foundation of any system or product, not something to be tacked on later. This perspective helps ensure robust and resilient systems that can withstand potential threats and protect data effectively.


Cyber terrorism could also become more attractive as the real and virtual worlds become more closely coupled, with automobiles, appliances, and other devices attached to the Internet.

- Dorothy Denning

Other, Attractive, Virtual, Attached

If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation.

- Dorothy Denning

Question, Critical, Given, Cyber

With those people, I'm very far apart, because I believe that government access to communications and stored records is valuable when done under tightly controlled conditions which protect legitimate privacy interests.

- Dorothy Denning

Access, Records, Very, Tightly

Systems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons.

- Dorothy Denning

May, Damage, Using, Weapons

Everyone is a proponent of strong encryption.

- Dorothy Denning

Strong, Everyone, Proponent, Encryption

The concern is over what will happen as strong encryption becomes commonplace with all digital communications and stored data. Right now the use of encryption isn't all that widespread, but that state of affairs is expected to change rapidly.

- Dorothy Denning

Digital, Happen, Over, Encryption

I don't have a particular recommendation other than that we base decisions on as much hard data as possible. We need to carefully look at all the options and all their ramifications in making our decisions.

- Dorothy Denning

Data, Other, Making, Ramifications

While many hackers have the knowledge, skills, and tools to attack computer systems, they generally lack the motivation to cause violence or severe economic or social harm.

- Dorothy Denning

Motivation, Social, Harm, Hackers

While the vast majority of hackers may be disinclined towards violence, it would only take a few to turn cyber terrorism into reality.

- Dorothy Denning

May, Vast Majority, Towards, Hackers

We have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders.

- Dorothy Denning

Always, Been, Appropriate, Orders

I think most organizations have an interest in key recovery, at least with respect to stored data.

- Dorothy Denning

Think, I Think, Most, Stored

Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal.

- Dorothy Denning

Generation, Digital, Next, Disposal

I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access.

- Dorothy Denning

Some, Include, Which, Capability

I prefer leaving things to the market as much as possible.

- Dorothy Denning

Market, Things, Prefer, Leaving

However, leaving everything to the market is not necessarily good for society.

- Dorothy Denning

Society, Market, However, Leaving

Generally I'm against regulation.

- Dorothy Denning

Against, Generally, Regulation

If you're searching for quotes on a different topic, feel free to browse our Topics page or explore a diverse collection of quotes from various Authors to find inspiration.