I guess a "security mind-set" is necessary at appropriate levels of the 
organization, and this organization appears to have had no such mind-set.

<BACK patting>

Back in the mid 90's I designed and wrote a small system for one of the 
brokerage houses. This system replaced the then current method of getting 
"trades" from the brokerage house to a custodian bank, to process the financial 
aspects of the trade, via FAX. (they actually had a room full of fax machines 
and a small staff that did nothing but fax trade orders to custodians banks 
around the world as they came off the printers).

Anyway, part of my design included 128 bit encryption security measures and the 
key changed with each transmission to each custodian bank. If things got of out 
sync, and they did on occasion (we were using Windows after all), it required 
human intervention on both ends.

When I presented the original design, I had to convince some staff members of 
the importance of the security that was designed in. Luckily it took all of 
five minutes with the CIO to convince him and it then filtered down to the rest 
of the staff. However, the CIO had some trouble convincing his boss.

To this day I have no idea why there was reluctance. It didn't "cost" any more 
to do it the proper way; other than the development and testing time of that 
section of code.

When we presented the system to the board, as the replacement for the FAX 
method, not one person asked if it was a secure way of doing things.

Go figure...

</BACK patting>





On Wed Apr 25 12:37 , 'McKown, John' <[EMAIL PROTECTED]>sent:



>> -----Original Message-----

>> From: IBM Mainframe Discussion List 

>> [EMAIL PROTECTED]','','','')">[EMAIL PROTECTED] On Behalf Of Rick Fochtman

>> Sent: Wednesday, April 25, 2007 12:24 PM

>> To: [email protected]

>> Subject: Re: Not mainframe but the latest in the TJMax fisaco

>> 

>> 

>> -----------------------------------------------------

>> 

>> >Because of their lax security measures, they now face 

>> several lawsuits.

>> >

>

>Yes, amazing how top level management don't even consider the TCO of an

>insecure system. And, from what I gather, the main problem shown here is

>machine to machine communications "in the clear". I don't entirely know

>what to do about this. In my paranoid moments, I would want an encrypted

>tunnel from machine "A" to machine "B" for every combination of "A" and

>"B" on the LAN who talk to each other. I don't know how much overhead

>this would add. But the "tunnel" would be established at "boot" time or

>upon "first connect" and stay up until shutdown.

>

>--

>John McKown

>Senior Systems Programmer

>HealthMarkets

>Keeping the Promise of Affordable Coverage

>Administrative Services Group

>Information Technology

>

>The information contained in this e-mail message may be privileged

>and/or confidential. It is for intended addressee(s) only. If you are

>not the intended recipient, you are hereby notified that any disclosure,

>reproduction, distribution or other use of this communication is

>strictly prohibited and could, in certain circumstances, be a criminal

>offense. If you have received this e-mail in error, please notify the

>sender by reply and delete this message without copying or disclosing

>it. 

>

>----------------------------------------------------------------------

>For IBM-MAIN subscribe / signoff / archive access instructions,

>send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO

>Search the archives at http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to