The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards. — Gene Spafford
First, our focus on security is on the infrastructure itself. So it is all about how you protect the network, the device, and the application that is riding on the server. — John W. Thompson
If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology. — Bruce Schneier
Security is mostly a superstition. It does not exist in nature. — Helen Keller
Out of the most secure things, the most secure is to doubt. — Simon Bolivar
Computer Security Image Quotes
Until you cross the bridge of your insecurities, you can't begin to explore your possibilities.
Cyber Security Quotes
I dream of a Digital India where cyber security becomes an integral part of our National Security. — Narendra Modi
The choices we make now will shape the future of not just our countries, but the world at large. We should intensify our cooperation in confronting global challenges like Terrorism, Cyber Security and Climate Change. — Narendra Modi
We put up the very best cyber security - what I call infrastructure to stop them, but [hackers] constantly [didn't stop]. — Donna Brazile
The desire for security and the fear of insecurity are the same thing. To hold your breath is to lose your breath. A society based on the quest for security is nothing but a breath-retention contest in which everyone is as taut as a drum and as purple as a beet.
I know our congressmen hasn't done it, has anybody put a server in their basement? Oh boy, Hillary Clinton's only - Hillary Clinton's only experience in cyber security involves her criminal scheme to violate federal law, engineering a massive cover up and putting the entire nation in harm's way. — Donald Trump
There are cyber threats out there, this is a dangerous world, and we have to be safe, we have to be secure no matter the cost. — Edward Snowden
The issue of cyber-security, cyber-crime, and cyber-malfeasance has an impact on a whole range of issues, not the least of which is civil liberties, political activity, and so on and so forth. — Misha Glenny
Growth demands a temporary surrender of security.
Cyber security will be an issue that I will be absolutely focused on as president. Because whether it's Russia, or China, Iran or North Korea more and more countries are using hacking to steal our information, to use it to their advantage. And we can't let that go on. — Hillary Clinton
European security may now depend on Germany, France, Britain and one or two others, and it's better to start planning now for the possibility of European-only cyber-defense, counter-terrorism, and conventional defense too. — Anne Applebaum
Of course we [with Angela Merkel] discussed our commitment to meeting shared security challenges from countering cyber threats to ensuring that Iran continues to live up to the terms of the Iran nuclear deal. — Barack Obama
The cyber review team will proceed with the most sensitive systems first, but ultimately all systems will be analyzed and made as secure as modern technology permits. And hopefully, that's gonna be our technology. — Donald Trump
Information Security Quotes
We put people of concern on the watch list or the no-fly list, so we have a number of layers of security beyond the airport checkpoint. We gather as much information about a passenger as the law allows without profiling. — John Pistole
I take the market-efficiency hypothesis to be the simple statement that security prices fully reflect all available information. — Eugene Fama
A person's credit report is one of the most important tools consumers can use to maintain their financial security and credit rating, but for so long many did not know how to obtain one, or what to do with the information it provided. — Ruben Hinojosa
Good fences make good neighbors.
Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in seconds; and be stolen without your knowledge. — Bruce Schneier
The securities laws of the 1930s were so important because it forced companies to file registration statements and issue prospectuses, and it remedied the imbalance of information. — Ron Chernow
It's horrible to think that a small cadre of people would manipulate that information. I mean, for God's sake, we've admitted that we were experimenting on our veterans with mustard gas. So there is no security question. It can't possibly be the reason. — Dwight Schultz
Treat your password like your toothbrush. Don't let anybody else use it, and get a new one every six months.
The word 'security' is a broad, vague generality whose contours should not be invoked to abrogate the fundamental law embodied in the First Amendment. The guarding of military and diplomatic secrets at the expense of informed representative government provides no real security. — Hugo Black
The information encoded in your DNA determines your unique biological characteristics, such as sex, eye color, age and Social Security number. — Dave Barry
I think anybody in our - in the, in the national security apparatus has, has got to take full cognizance of their responsibility for the safeguarding of classified information. — Michael Mullen
Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench. — Gene Spafford
Computer Hacking Quotes
While many hackers have the knowledge, skills, and tools to attack computer systems, they generally lack the motivation to cause violence or severe economic or social harm. — Dorothy E. Denning
A lot of hacking is playing with other people, you know, getting them to do strange things. — Steve Wozniak
I don't even have any good skills. You know like nunchuck skills, bow hunting skills, computer hacking skills. Girls only want boyfriends who have great skills! — Jon Heder
When you zap things with light to build quantum computers, you're hacking existing systems. You're hijacking the computation that's already happening in the universe, just like a hacker takes over someone else's computer. — Seth Lloyd
Be afraid of the Chinese. I mean, the Chinese shoot down satellites in space; they hack into Google's computers; the Osama bin Laden people can't make their underwear blow up. — Francis Fukuyama
Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal. — Dorothy E. Denning
Look, Sage. I don't know much about chemistry or computer hacking or photosynthery, but this is something I've got a lot of experience with." I think he mean photosynthesis, but I didn't correct him. "Use my knowledge. Don't let it go to waste. — Richelle Mead
Every ISP is being attacked, maliciously both from in the United States and outside of the United States, by those who want to invade people's privacy. But more importantly they want to take control of computers, they want to hack them, they want to steal information. — Darrell Issa
China is stealing our intellectual property, our patents, our designs, our technology, hacking into our computers, counterfeiting our goods. — Mitt Romney
The reason I said the Internet is dangerous is that a couple smart guys could hack into a computer and shut down the Eastern seaboard if they wanted to. It's a terrible, out-of-control thing. — John Mellencamp
Computer Technology Quotes
The best computer is a man, and it’s the only one that can be mass-produced by unskilled labor. — Wernher Von Braun
The most amazing achievement of the computer software industry is its continuing cancellation of the steady and staggering gains made by the computer hardware industry. — Henry Petroski
The question of whether computers can think is like the question of whether submarines can swim. — Edsger Dijkstra
From then on, when anything went wrong with a computer, we said it had bugs in it. — Grace Hopper
What amplifies the transformational power ahead is the confluence of two major technological currents today: the universal access to mobile computing and the pervasive use of social networks. — Michael Saylor
The computer is the most extraordinary of man's technological clothing; it's an extension of our central nervous system. Beside it, the wheel is a mere hula-hoop. — Marshall McLuhan
There can be infinite uses of the computer and of new age technology, but if teachers themselves are not able to bring it into the classroom and make it work, then it fails. — Nancy Kassebaum
Automation applied to an inefficient operation will magnify the inefficiency. — Bill Gates
We're in an inflection point where it's cheaper to learn to read on a tablet computer than it is to learn to read on paper. — Michael Saylor
Atlantis was a highly evolved civilization where the sciences and arts were far more advanced than one might guess. Atlantis was technologically advanced in genetic engineering, computer science, inter-dimensional physics, and artistically developed with electronic music and crystal art forms. — Frederick Lenz
Home Security Quotes
To separate from my culture (as from my family) I had to feel competent enough on the outside and secure enough inside to live life on my own. Yet in leaving home I did not lose touch with my origins because lo mexicano is in my system. I am a turtle, wherever I go I carry 'home' on my back. — Gloria E. Anzaldúa
Quite frankly, I think nothing could do more to immediately bolster national security then enabling us to produce more oil and gas here at home at a price consumers could afford. — Phil Gramm
Mystery of mysteries, water and air are right there before us in the sea. Every time I view the sea, I feel a calming sense of security, as if visiting my ancestral home; I embark on a voyage of seeing. — Hiroshi Sugimoto
First, we must continually reaffirm the principle that the security of the United States is not, and should never be, a partisan matter. The United States can best defend its national security interests abroad by uniting behind a bipartisan security policy at home. — William Cohen
United with our allies, we will stand up for freedom and democracy around the world. Recognising that we can’t have security at home without having security abroad. — Liz Truss
You can't escape the taste of the food you had as a child. In times of stress, what do you dream about? Your mother's clam chowder. It's security, comfort. It brings you home. — Jacques Pepin
Home is a sanctuary for me and the place where I can relax. Everyone should have the right to a safe and secure home. — Corinne Bailey Rae
Nothing can bring a real sense of security into the home except true love. — Billy Graham
The 4th Amendment and the personal rights it secures have a long history. At the very core stands the right of a man to retreat into his own home and there be free from unreasonable governmental intrusion. — Potter Stewart
Computer Network Quotes
Some people say the network is the computer. We believe the display is the computer. — Jensen Huang
All one needs is a computer, a network connection, and a bright spark of initiative and creativity to join the economy. — Don Tapscott
Bitcoin is backed by the largest computer network in the world, a network orders of magnitude larger than the combined size of the clouds that Amazon, Google, and Microsoft have built over the last 15-20 years. — Cathie Wood
The utility model of computing - computing resources delivered over the network in much the same way that electricity or telephone service reaches our homes and offices today - makes more sense than ever. — Scott Mcnealy
I think the brain is essentially a computer and consciousness is like a computer program. It will cease to run when the computer is turned off. Theoretically, it could be re-created on a neural network, but that would be very difficult, as it would require all one's memories. — Stephen Hawking
The early cyberpunk idea was that networked computers would let us do our work at home, as freelancers, and then transact directly with peers over networks. Digital technology would create tremendous slack, allow us to apply its asynchronous, decentralized qualities to our own work and lives. — Douglas Rushkoff
In all large corporations, there is a pervasive fear that someone, somewhere is having fun with a computer on company time. Networks help alleviate that fear. — John Dvorak
The most compelling reason for most people to buy a computer for the home will be to link it to a nationwide communications network. We're just in the beginning stages of what will be a truly remarkable breakthrough for most people - as remarkable as the telephone. — Steve Jobs
Today, a group of 20 individuals empowered by the exponential growing technologies of AI and robotics and computers and networks and eventually nanotechnology can do what only nation states could have done before. — Peter Diamandis
The Internet is a giant international network of intelligent, informed computer enthusiasts, by which I mean, "people without lives." We don't care. We have each other. — Dave Barry
Computer Viruses Quotes
Our examination of computer viruses leads us to the conclusion that they are very close to what we might define as "artificial life." Rather than representing a scientific achievement, this probably represents a flaw in our definition. — Gene Spafford
The problem of viruses is temporary and will be solved in two years. — John McAfee
Like computer viruses, successful mind viruses will tend to be hard for their victims to detect. If you are the victim of one, the chances are that you won't know it, and may even vigorously deny it. — Richard Dawkins
I think computer viruses should count as life. — Sayings
In view of all the deadly computer viruses that have been spreading lately, Weekend Update would like to remind you: when you link up to another computer, you're linking up to every computer that that computer has ever linked up to. — Dennis Miller
I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We've created life in our own image. — Stephen Hawking
After all, just one virus on a computer is one too many. — Glenn Turner
In our interconnected world, novel technology could empower just one fanatic, or some weirdo with a mindset of those who now design computer viruses, to trigger some kind of disaster. Indeed, catastrophe could arise simply from technical misadventure - error rather than terror. — Martin Rees
Companies spend millions of dollars on firewalls and secure access devices, and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer and operate computer systems — Kevin Mitnick
The power of the people pervading the proposed system, together with the strong confederation of the states, will form an adequate security against every danger that has been apprehended. — John Dickinson
So if people have an opportunity for a decent job, a decent education, a decent health care system and security, I know that forceful migration will be reduced to zero. —
On the other hand, all kinds of adventurous schemes to add security checkpoints to subway and bus systems have been circulating since the London attacks. This is nonsense. No one can guaranty 100 percent security. — Otto Schily
Bitcoin Mining serves as the foundation of the monetary network - critical to its growth, stability, longevity, vitality, & integrity. The Proof of Work architecture is a masterpiece of engineering that anchors the system to the real world, providing Seven Layers of Security. — Michael Saylor
I think anybody who is interested in keeping their money safe from the criminal banking system would want gold, silver, and Bitcoin. — Max Keiser
The optimists' claim that security competition and war among the great powers has been burned out of the system is wrong. In fact, all of the major states around the globe still care deeply about the balance of power among themselves for the foreseeable future. — John Mearsheimer
One of the critical issues that we have to confront is illegal immigration, because this is a multi-headed Hydra that affects our economy, our health care, our health care, our education systems, our national security, and also our local criminality. — Allen West
Other countries, such as Israel, successfully employ behavior detection techniques at their airports, but the bloated, ineffective bureaucracy of TSA has produced another security failure for U.S. transportation systems. — John Mica
There is nothing more important to our Nation's future, to our homeland security, and to our economy than ensuring we have a top-notch educational system that is the envy of the world. — Jim Jeffords
The computational power of the network is proportional to difficulty; and it appears that difficulty is proportional to bitcoin price. It follows that unless bitcoins become substantially more valuable than they are today, the Bitcoin network will never be substantially more resistant to attack than it is today. For Bitcoin to succeed and become secure, bitcoins must become vastly more expensive. — Hal Finney
This will surprise some of your readers, but my primary interest is not with computer security. I am primarily interested in writing software that works as intended. — Wietse Venema
Passwords are like underwear: you don’t let people see it, you should change it very often, and you shouldn’t share it with strangers. — Chris Pirillo
Security is, I would say, our top priority because for all the exciting things you will be able to do with computers - organizing your lives, staying in touch with people, being creative - if we don't solve these security problems, then people will hold back. — Bill Gates
The fundamental driver in computer security, in all of the computer industry, is economics. That requires a lot of re-education for us security geeks. — Bruce Schneier
The security of computers and the Internet is a horrible and dangerous mess. Every week we hear about breaches of databases of Social Security numbers and financial information and health records, and about critical infrastructure being insecure. — Matt Blaze
This Windows 95 hairball has become so big, so unmanageable, so hard to use, so hard to configure, so hard to keep up and running, so hard to keep secure. Windows 95 is a great gift to give your kid this Christmas because it will keep your kid fascinated for months trying to get it up and running and trying to figure out how to use it. — Scott Mcnealy
Being able to break security doesn't make you a hacker anymore than being able to hotwire cars makes you an automotive engineer. — Eric S. Raymond
If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. — Dan Farmer
We're responsible for the creation of the PC industry. The whole idea of compatible machines and lots of software - that's something we brought to computing. And so it's a responsibility for us to make sure that things like security don't get in the way of that dream. — Bill Gates
People have to be free to investigate computer security. People have to be free to look for the vulnerabilities and create proof of concept code to show that they are true vulnerabilities in order for us to secure our systems. — Edward Snowden
Look at airport security now. What started out as definite racial profiling is now where the computer picks a name. That's why you get a seven-month-old getting a pat down. [Imitates a security officer.] "Check the diapers. They're full." — Robin Williams
A hacker is someone who enjoys playful cleverness—not necessarily with computers. The programmers in the old MIT free software community of the 60s and 70s referred to themselves as hackers. Around 1980, journalists who discovered the hacker community mistakenly took the term to mean “security breaker.” — Richard Stallman
Stealing is stealing, whether you use a computer command or a crowbar, and whether you take documents, data or dollars. — Carmen Ortiz
Whether it's watching a $4,000 laptop fall off the conveyor belt at airport security, contending with a software conflict that corrupted your file management system, or begging your family to stop opening those virus-carrying 'greeting cards' attached to emails, all computer owners are highly leveraged and highly vulnerable technology investors. — Douglas Rushkoff
To model correctly one tranche of one CDO took about three hours on one of the fastest computers in the United States. There is no chance that pretty much anybody understood what they were doing with these securities. Creating things that you don't understand is really not a good idea no matter who owns it. — John Thain
It used to be expensive to make things public and cheap to make them private. Now it's expensive to make things private and cheap to make them public. — Clay Shirky
Microsoft made a big deal about Windows NT getting a C2 security rating. They were much less forthcoming with the fact that this rating only applied if the computer was not attached to a network and had no network card, and had its floppy drive epoxied shut, and was running on a Compaq 386. Solaris's C2 rating was just as silly. — Bruce Schneier
People don't want to talk about death, just like they don't want to talk about computer security. Maybe I should have named my workstation Fear. People are so motivated by fear. — Dan Farmer
If you cannot make moving pictures about yourself, your country and your culture, it's as if you do not exist anymore in this world of images we live in. Because now when we all switch on our smartphones or our iPads or our computers, it's all image and sound. All people and cultures must work to secure their place in the digital space. Cinema is also political in this way. — Rithy Panh
My background, I really am a computer hacker. I've studied computer science, I work in computer security. I'm not an actively a hacker, I'm an executive but I understand the mindset of changing a system to get the outcome that you want. It turns out to make the coffee, the problem is actually how the beans get turn into green coffee. That's where most of the problems happen. — Dave Asprey
I built my own studio. I don't have the professional language to describe it because I'm not a videographer - but I'm a technician. So I get the camera, I get all the things that translate the camera to the computer, I set up a live session, I do the security on it, I set up a background so I can key it out, like newscasters do, and replace it with whatever I want - and I can be anywhere I need to be. — Edward Snowden
I have a son. He's 10 years old. He has computers. He is so good with these computers, it's unbelievable. The security aspect of cyber is very, very tough. And maybe it's hardly doable.But I will say, we are not doing the job we should be doing. But that's true throughout our whole governmental society. — Donald Trump
I use a computer, but before I begin each new book I keep a notebook. I write down everything that comes to mind during that period before I actually begin. It might take months or weeks. That notebook is my security blanket so that I never have to face a blank screen (or blank page). But I print out often and my best ideas usually come with a pencil in my hand. — Judy Blume
I don't think it's a lack of will. I think it's an issue of what people view as constitutional rights under the Fourth Amendment, number one, and what customers and business partners expect around the world from secure computing systems. And it's a difference of view. — Rod Beckstrom
We live in a world where we're all on computers and tablets and phones, all the time, so something as odd as computer hacking or a virus is really scary because it gets to the heart of our security. — Denis O'Hare
Bin Laden was, though, a product of a monumental miscalculation by western security agencies. Throughout the 80s he was armed by the CIA and funded by the Saudis to wage jihad against the Russian occupation of Afghanistan. Al-Qaida, literally "the database", was originally the computer file of the thousands of mujahideen who were recruited and trained with help from the CIA to defeat the Russians. — Robin Cook
As companies move to web-based computing they get a lot more servers, which are difficult to manage and control. All kinds of problems can arise - security, quality and worms. — Ben Horowitz
My current computer, in addition to 'DOS,' has 'Windows,' which is another invention of Bill Gates, designed as a security measure to thwart those users who are somehow able to get past DOS. — Dave Barry
As new generations [of computers] come out, usually there are increased complexity and features, [that lead to] increased security problems. Plus, other industries have shown that every new generation has its own set of security problems. — Avi Rubin
People's computers are not getting more secure. They're getting more infected with viruses. They're getting more under the control of malware. — Avi Rubin
Security wins many battles but loses the security war. We are definitely going backwards in computer security. — Adi Shamir
Because I don't believe that it's really desirable to have security on a computer, I shouldn't be willing to help uphold the security regime. — Richard Stallman
Coming back to the topic of computer security, the TCP Wrapper is an example of such a safety net. I wrote it when my systems were under attack by someone who appeared to walk through walls. — Wietse Venema
At Microsoft, we're investing heavily in security because we want customers to be able to trust their computing experiences, so they can realize the full benefits of the interconnected world we live in. — Steve Ballmer
It's very important to remember that it's your intellectual property; it's not your computer. And in the pursuit of protection of intellectual property, it's important not to defeat or undermine the security measures that people need to adopt in these days. — Stewart Baker
In Conclusion
Which quotation resonated with you best? Did you enjoy our collection of computer security quotes? Or may be you have a slogan about computer security to suggest. Let us know using our contact form.
Citation
Feel free to cite and use any of the quotes in this collection of computer security quotations. For popular citation styles(APA, Chicago, MLA), please use this citation page.