This is a document discusses an interesting perspective on network security and how to develop a sound security strategy.