|
Summary of LONG post. ================== We have identified several challenges with computer security in our recent discussion (archives at midrange dot com) and some of us have stated some beliefs in reality that others have shown to be false (e.g. extremely inexpensive nature of reliable backup that crosses platforms). My position is that many of the challenges of computer security today do not need to be that way in perpetuity. I believe they are easily fixed & that opportunities exist for computer vendors, some of them on this list, to make a small bundle bringing that reality to the rest of us. I took some of the links below from my working document on Computer Security Myths, which is now up to approx 35 pages, to illuminate my points, if you wish to pursue the ideas I am sharing. Anyone who is interested can contact me off the list to get a copy via e-mail attachment of what I am working on. JT asked in another post what might be done to persuade the powers that be that an improvement in computer security is a worth while investment ... well you know, if one of your employees sends an e-mail to an employee of a business partner & that e-mail is infected with a computer virus, do you think that might have a negative impact on the business relationship? There might even be legal liabilities ... check out http://www.mazunetworks.com/radin-toc.html I believe that many enterprises have invested in computer systems such that making them secure is not a simple proposition, and what they really need to do is take security into consideration at the time that they retire their platform for next generation investments. I have stated many times that if you get a computer system whose security is a house of cards & you put a padlock on it, that aint gonna work, you have to rebuild the house so it is made out of secure stuff ... http://www.zdmcirc.com/zdmcirc/popups/ewkpop.ht recent series of articles in e-Week on computer security show exactly how much hassle it is to add computer security to the house of cards that is what passes for computer systems that most enterprises buy these days. A comparable resource is http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf I absolutely agree that many many enterprises have computer systems that can be made very secure but have not in fact been done so. I absolutely agree that in most cases the reason why an enterprise has an insecure computer system is not a technical problem but a people problem. I absolutely agree that people are in fact a major weak link for computer security today & in recent history, but things are being done in that department so this does not always need to be the case. These things could be highlighted, such as in computer magazine articles, to help accelerate the repair process, My employer has a form of ISO 9xxx quality standards with respect to the products we make & engineer, so I know something about the subject without being an expert in it. Since I first observed ISO 9xxx, the quality industry has made great strides. In the beginning, it was merely the notion that a company knew what the heck it was doing, had documented that, and was in fact adhering to its own documents. But ISO 9xxx has advanced to the point that you get higher marks if your documented procedures include certain things that other companies expect you to have, that might be standards in some industries. Now the weak link of people doing unwise practices with respect to corporate security, could be addressed via this ISO 9xxx standards approach ... there would be certain things that belong in the company practices document if they take security seriously, that the ISO auditor could verify they are in fact doing. We are now at the stage in meeting ISO auditor standards, that not only we have to have the good stuff in our company practices documentation, we have to be able to prove we are doing the good stuff. We have internal audits by our own people, and we have external audits, and we get report cards that are used to improve our ISO standing towards certain goals. These report cards are understandable to non-technical people. It is self evident to everyone looking at these report cards what it is that is being measured & how good or bad a job we did. Computer security could be done the same way. You do not have to be a technician to understand the reports from outfits like http://www.pentasafe.com Some of us work with a computer platform that CAN be secured, which is to say it is on the directory of the computer systems that have been certified as coming with high security capabilities at http://www.radium.ncsc.mil/tpep/epl/epl-by-vendor.html That site also lists what is needed to implement this conceivable high security & that stuff does require a computer technician, in my opinion, to figure it out & get it done right. However, if the software does not exist today from places like http://www.pentasafe.com I figure it is only a matter of time until people can get computer security audits based on the high security system data ... Does your enterprise have a high security computer system yes or no ... and has it been implemented to take advantage of the high security capabilities yes or no ... You do not need to be a computer techician to understand that report card ... you do need to be a computer technican to explain WHY the company might have a computer system that is capable of high security but has not in fact been installed that way, and what decisions have been made at the company that mean that it is not practical to fix the security. The usual example, is that the company has made demands that certain software be available for the users, and that software vendor is not a believer in adhering to security standards, so so long as that software vendor is desired by corporate, good security cannot be provided. However, that also is information that might become old news, as security software audit tools advance & can address what we have bought from some software vendor that is anti-security, to evaluate what is doable in the area of modifications so that we can keep the benefits of what that vendor has to offer but at the same time plug the security holes. It is my understanding that http://www.pentasafe.com has a security audit that is BPCS specific ... I have a personal interest in this topic ... this last year I have been agressively cleaning up our BPCS data base to get rid of dead records ... one of the major holes in BPCS software is a lack of clean up of various data when it is no longer relevant, so I have been identifying files that are gluttons for disk space because they have records dating back to 1998 that we no longer need & they will not go away through the vanilla BPCS software unless I make them go away. I have also been focusing on improving performance for my BPCS users, and my radar screen includes improving security. I think BPCS 405 CD is a great stable ERP package & it will be a great shame if & when my employer finally moves to something else. If & when we do, I hope it will be something like http://www.erros.co.uk/ which is reviewed at http://www.400times.co.uk/Documents/ERROS1.htm ... it is apparent that great complexity of major enterprise business rules can be managed with high security at PC prices & quite possibly lower staffing overhead than is standard for the 400 today, so you get the lowest possible operating costs, rock bottom purchase costs, and extremely sophisticated complexity but it is right up against what the users need, without any layers of abstraction that have vulnerabilities for hackers. I do not seriously believe we will go there, because this is thinking so far outside the box that many people might think I am confusing science fiction with reality. Computer security on the 400 is not expensive & it is not a brain buster, it is merely finding the time to get the job done. IBM has a free site where we go with information about our security situation & it makes reccommendations with respect to where our security may be inadequate & what we ought to do about that. http://www.as400.ibm.com/tstudio/secure1/advisor/secwiz.htm That URL might have been changed in the rebranding. Suppose you have seen the FBI list of the 20 most common computer security blunders that enterprises consistently make. If you go to the source, there are links there to get at software that will evaluate your computer network to see if you have any of those exposures & help you plug them. http://www.sans.org/top20.htm There is also a searchable index of known computer security risks at http://cve.mitre.org/cve/ Now the ISO organization does have 9xxx that applies to computer security, but it has not gained the industry wide respect that we have for ISO 9xxx related to actual products & services delivered by companies to other companies. When you looking for information on this kind of topic on the internet, the buzzwords include "Software Quality" and "Computer Security Certification." http://www.iso9000solutions.com/ ... ISO 9000 starting point for links http://www.qualitydigest.com/html/iso9000.html ISO 9000 data base design http://www.sysmod.com/psp.htm software cumulative improvement process http://www.sysmod.com/swdev.htm software quality improvement links http://www.pdmic.com/IPDMUG/IPDMUGfaq.html engineering software quality http://www.iccp.org Institute for Certification of Computing Professionals http://www.ISC2.org Certified Information Systems Security Professional http://nsa1.www.conxion.com/ collection of Security Recommendation Guides from the National Security Agency of the US Government > From: jt@ee.net (jt) > > Al, > > I think it's a given that people are gonna be the weakest link here. That's > a bug that's never gonna be fixed... > > What I'm looking for is this: if a company (or individual) keeps proper > PHYSICAL security of the system, can it then be protected. > > This would allow companies with some ISO 9xxxx certification of their > physical security, to become trusted. Pairs of these trusted companies can > then do business "relatively" securely, IMV... > > jt > > | -----Original Message----- > | [mailto:midrange-l-admin@midrange.com]On Behalf Of MacWheel99@aol.com > | Subject: Re: Where are all of the /400's going. (was RE: QUSER on ODBC > | requests) > | > ==> But here's the thing: > | > (I'm NOT contradicting you, but just asking the question.) > | > Has it ever been done AND/OR IS it theoretically possible: > | > COULD a 400 machine serial number be hacked...?!? > | > I guess I'm asking if > | > there's ANY WAY CONCEIVABLE? I think this is a key question. > | > | If a 400 is not secure, anything can be hacked. > | > | If a device, that is connected to a secure 400, is itself not secure, then > | that is another possibility. Does corporate culture permit users to have > | their passwords "programmed" into their PC hardware so that they > | do some PLAY KEY combination > | & it gets them where they need to go a lot? > | Are those same > | PCs accessible via PC Anywhere or equivalent system (there's a bunch of > | competitors) & can those same PLAY KEY deals be done remotely? Do those > | users have relatively high levels of security, so they can get into stuff > | like WRKSYSVAL? > | > | Remember when Microsoft got hacked & someone downloaded a lot of > | source code that they had considered confidential? > | An employee with home PC was trusted > | to access Microsoft corporate network. > | The employee home PC did not have the > | latest firewall software protections. > | Hacker broke into employee home PC & > | from there got into Microsoft network. > | 400 site can be equally vulnerable > | to this sort of thing depending on corporate culture. > | > | The kind of thing that worries me is trusted partners. For reasons of > | software licensing, we have given out our hardware serial number > | to several > | vendors, some of which are authorized to dial into our system to provide > | various kinds of tech support ... now suppose one of them is > | hacked ... now all their customers are exposed. MacWheel99@aol.com (Alister Wm Macintyre) (Al Mac)
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.