Lynn Wheeler <[EMAIL PROTECTED]> writes:
for some topic drift ... part of the issue is that the majority of
such compromises have involved data-at-rest ... not data-in-transit
... and lots of implementations don't provide the access control that
may be found in mainframe installations ... so encrypting the data at
risk might be viewed as compensating process for inadequate access
control. the other part of it is that studies have something like 70
percent of such compromises have involved insiders (who already may
have some level of access).

re:
http://www.garlic.com/~lynn/2007n.html#85 PCI Compliance - Encryption of all 
non-console administrative access.

... above post may have only made it to the newsgroup, not the mailing list

for some additional drift, a recent post in ongoing financial crypto blog 
thread on (effectively) decline in security and assurance over the past several 
decades
http://www.garlic.com/~lynn/aadsm27.htm#53 Doom and Gloom spreads, security revisionism 
suggests "H6.5: Be an adept!"

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to