At 10:25 a.m. 7/01/2014, Marc Hakman wrote:

>Hi Helen,
>
>if I understand you well, I have a steel armor archive cabinet on wheels 
>without a rear wall. 

In the worst-case scenario, yes.  But there is far from enough information to 
deduce exactly how your vendor has set up your installation.

>Approved by all security agencies (NSA etc) and several other criminal 
>organizations. And, I even didn’t know. ;)

I expressed surprise that the software would have received government 
certification if it was set up wrongly from a security perspective.  Only your 
supplier/developer can go through this with you and explain what (if anything) 
you need to do.

>I have contacted them, the supplier / developer (not vendor) and the 
>certification body. Waiting for their reactions.

Correct course of action, but especially the developer.  Ask him/her to explain 
how the SYSDBA account figures in client access to your database and how SQL 
permissions are set up for your database.

>It is possible to sent you a personal mail? Uncleared ist my problem with the 
>chip card.

No;  except in the context of a support arrangement with IBPhoenix.

>PS: read also the mail of <mailto:[email protected]>[email protected]

I did.  His problem is different to yours.  Someone has taken a copy of his 
database and has stolen his database design.  Whether his data security is good 
or bad is not relevant to this particular problem.  Maybe he is less concerned 
about the security of the data than the theft of his intellectual property. It 
is likely that his database contains executable code in the form of triggers 
and stored procedures, which may have cost him hundreds of hours in development 
time.  Sadly, if people store their databases and backup files in insecure 
places, they make them vulnerable to theft.

-- Don't put databases or backup files in shared locations
-- Don't allow unauthorised access to locations storing databases and backup 
files

Those two are easy.  These are tougher:

-- Don't employ people who are likely to steal files off your servers
-- Don't deploy your software to customers who might employ software thieves.

Actually, I was puzzling about how he knows this bad guy stole his 
database....he would have needed to "steal back" a copy to establish that, no?

Helen Borrie, Support Consultant, IBPhoenix (Pacific)
Author of "The Firebird Book" and "The Firebird Book Second Edition"
http://www.firebird-books.net
__________________________________________________________________ 



------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Visit http://www.firebirdsql.org and click the Resources item
on the main (top) menu.  Try Knowledgebase and FAQ links !

Also search the knowledgebases at http://www.ibphoenix.com 

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Yahoo Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/firebird-support/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/firebird-support/join
    (Yahoo! ID required)

<*> To change settings via email:
    [email protected] 
    [email protected]

<*> To unsubscribe from this group, send an email to:
    [email protected]

<*> Your use of Yahoo Groups is subject to:
    http://info.yahoo.com/legal/us/yahoo/utos/terms/

Reply via email to