I am not sure this has been posted before on AO.
Anyways.

The following links describe a sorta alternative way of looking at computer security.

Part 1.
Part 2.