Information Security has a dilemma:
the problem is that we don’t want to be seen(interfere) with whatever the user wants to do, but yet there
need to be secure transactions. The security of our network and applications need to be part of Information technology actions.
The website, email and network traffic needs to get where it is supposed to go without interference or eavesdropping.
But in network security we have many types of grey areas.
False positives, negatives, and many Heisenberg principle issues (i.e. if you want to view network traffic you may be altering the traffic itself)