× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Here is a reply by "James Ritchie, CISA, QSA" to a post by me to DATALOSS
discussion group. I suggest that my friends:

1. Visit the link he provided
http://infoseccompliance.blogspot.com/2008/02/legal-implications-risks-and-problems.html

2. Scroll down to the "bullet" labeled
* PCI as the standard of care for a negligent security suit
Note in the 3rd paragraph of that section that there is a "here" link to
expert analysis of what went wrong in the TXJ case. Follow that link &
read it.

3. Review the rest of the context, including this thread in DATALOSS
Archives
< http://attrition.org/pipermail/dataloss>

4. Join the discussion.

Summary of what went wrong at TJX
* Their credit volume made them a type-1 merchant required to meet TWELVE
standards of PCI, but they only implemented THREE of them
* They stored track 2 data in violation of PCI rules ... with this data, a
crook can counterfeit a payment card with a fully functional magnetic
stripe
* Their wireless network was in violation of applicable standards
* Their computer network did not have proper firewalls to protect
sensitive data
* Their password rules were a farce
* They failed to install patches critical to protecting sensitive data
* They failed to maintain adequate intrusion detection systems

Here is an article that is very relevant to the concepts that have been
talked about under this thread.A This is from an attorney and dealing
with PCI contractual compliance.A Once you finish readingA the
document, it would not be a far stretch for a civil suit on a data
breachA (not justA PCI related) but using the require controls of the
DSS as a standard of due care. All company executives, time to start
having your legal staff involved with each any every piece of compliance
that your company faces.A Here is the link.
http://infoseccompliance.blogspot.com/2008/02/legal-implications-risks-and-problems.html
A

Al Mac Wheel wrote:

There will never be one perfect solution for all enterprises and
government agencies.

The risks are different depending on:
* The nature of the data and software that needs to be protected, from
what kinds of threats, which vary with the industry.
* The computer operating system, computer languages supported, access
methods.
* Just as a lot of software was designed for a long ago reality, when
the needs were less sophisticated, many buildings have security holes
... false ceilings that a human can travel over, circumventing locked
doors, being the most obvious.
* If a company does not own the building where their offices are
located, the landlord has keys to the place, which may be accessible
to a dishonest employee.A Also there may be other businesses in the
same building, with weaker security.A Crooks break into the weakest
link, then get through the building into their ultimate target.
* In our interconnected world, other enterprises can connect to our
systems ... some of this is mandated by government regulations, some
of it due to how our business functions.A Let's suppose we have given
access to our systems to tech support, consultants, auditors, etc. &
let's suppose that outfit gets penetrated ... can the penetration
extend to all the places they have access to?A We know there are
viruses that target e-banking software, so that if we do electronic
financial transfers ... everyone we do business with can be a weak
link.

However, there can be some standards that cross systems.

Some upgrades require temporary relaxing of some security.A There are
inspections that should be run after all upgrades, to ensure that
certain security standards are once again in place.A They should be
run whether or not the people, doing the upgrades, knowingly relaxed
any standards.

In addition to inspection to see if embezzlement going on, there can
also be inspection to see if people are keying sensitive information
into data areas whose labeling is non-sensitive information.

It is not enough to train people, and pass out policy manuals.A There
has to be a process of testing that the people are following the
rules, such as not to photocopy or fax certain sensitive information,
to have encryption on portable data storage devices that leave company
property, to lock facilities properly every night, promptly report
anything lost or stolen.

Testing software changes is done because we expect that something may
go wrong, so the test data base should not contain sensitive data on
real people, but rather data that is a simulation of the data to be
tested.

I had suggested in my work place ... the IBM OS tracks software and
data usage ... I can show how heavily we use what ... the auditors can
be told what is used to run our business on a regular basis ... they
can designate 2-3 programs, data sets, etc. to be inspected by a
computer auditor who is an expert on our application systems to
produce a report on what this is really doing, how accurate it is, to
be matched with the external auditors statement of how it has been
represented to them by the end users.A Do the two stories match?A
Depending on the results, they see how frequent it is wise to pick
other such samples in future audits.

I had suggested this due to the multiplicity of PC tools on people
personal work stations & end users divorced from internal logic of the
tools, or software designed by co-workers, and the evolving business,
where we are depending on tools designed years ago, for realities that
no longer exist today.

Manny Cho wrote:

I agree with Sanford in that this incident (and all of the other
loss notices that post every day to this site) is indicative of the
fact that the idea of i? 1/2one solutioni? 1/2 or one perfect
product is just not a reality today.A



_______________________________________________
Dataloss Mailing List
(dataloss@xxxxxxxxxxxxx)
http://attrition.org/dataloss

Tenable Network Security offers data leakage and compliance monitoring
solutions for large and small networks. Scan your network and monitor
your
traffic to find the data needing protection before it leaks out!
http://www.tenablesecurity.com/products/compliance.shtml


--
James Ritchie
CISA, PCI-QSA, ASV, MCSE, MCP+I, M-CIW-D, CIW-CI, Inet+, Network+, A+

Linkedin
http://www.linkedin.com/pub/1/b89/433

Attachments with this email, not explicitly referenced, should not be
opened. Always scan your email and their associated attachments for
viruses prior to opening.

This message and any accompanying documents are confidential and may
contain information covered under the Privacy Act, 5 USC 552(a), the
Health Insurance Portability and Accountability Act (PL 104-191), or the
Electronic Communications Privacy Act, 18 U.S.C. 2510-2521 and its
various implementing regulations and must be protected in accordance with
those provisions. Unauthorized disclosure or failure to maintain the
confidentiality of the information may result in civil or criminal
sanctions.

This e-mail is strictly confidential and intended solely for the
addressee. Should you not be the intended addressee you have no right to
any information contained in this e-mail. If you received this message by
mistake you are kindly requested to inform us of this and to destroy the
message.

_______________________________________________
Dataloss Mailing List (dataloss@xxxxxxxxxxxxx)
http://attrition.org/dataloss

Tenable Network Security offers data leakage and compliance monitoring
solutions for large and small networks. Scan your network and monitor
your
traffic to find the data needing protection before it leaks out!
http://www.tenablesecurity.com/products/compliance.shtml

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.