I'll jump in on this with a couple of thoughts from the application
programmer's standpoint.

Data masking may very well be needed to prevent the internal/employee
type of data breach (accidental or malicious).  However, it poses the
very serious problem that debugging production issues with production
data cannot (AFAIK) be done with "masking" in place unless the programs
are calling a "demasking" subroutine for every record/database row that
they process.  And when interactive debugging is used to resolve the
production issue (as is the "norm" these days), the plain-text values
are right there for the programmer to see and use -- or abuse.  Not to
mention that the unmasked values may also be right there in the dump,
for those who can read it.

If a production issue cannot be solved without the real offending data,
then enforced global "masking" prevents problems from being solved.
That is obviously not acceptable to either the programmer or to
management.

Also, adding the CPU overhead for "demasking" calls to already strained
CPU resources is going to cost the company large money, mainly in added
software costs for added MSU's to cover the "demasking" CPU usage.  Is
that added MSU software cost greater than the *potential* cost of a
breach?  Maybe, maybe not.  Especially when executive pay and perceived
"shareholder value" is tied to increasing profit by reducing "overhead"
like software MSU costs.  Cost/benefit analysis is not always carries
out by perfectly rational people.

And to take one of your own examples, the customer service agent for the
bank has an absolute need to see your very private information because
that's the exact information you are calling to ask about, and which
they must, by law, verify your identity against.  How can "masking" help
prevent employee abuse in that case?  In my view, it cannot.  Other
protocols are needed to protect against abuse in such cases, not least
among them serious audit and review capabilities, including key-loggers
and screen loggers and whatever other sorts of monitoring software as
can catch abuse for such sensitive work.

In the end, making sure your employees are honest (programmers and
service agents alike) and supporting them when they need it will be the
best solution to preventing breaches, IMHO.

Encrypting things that can be stolen or lost (tapes, hard drives, etc.)
does make sense to me, but masking on the mainframe just doesn't make
sense to me for too many real-world scenarios.

Peter
 
> -----Original Message-----
> From: IBM Mainframe Discussion List [mailto:[email protected]] On
> Behalf Of Galambos, Robert
> Sent: Tuesday, April 21, 2009 4:02 PM
> To: [email protected]
> Subject: Re: Data masking/data disguise Primer 1) WHY
> 
> Not a problem. Discussion is what this is about. BUT the only item I
can
> dis-agree with you is when you state that
> 
> 'Heartland: 100M records breached; claimed cost per record: $200 --
that's
> clearly hyperbole, but 100M times *anything* realistic is still a ton
o'
> money'
> 
> It isn't Hyperbole..... According to studies, which I mention at least
> one, the average cost is about $197 USD and that was in 2007. If you
> consider ALL cost (which can include lost of sales, legal costs, cost
to
> 'maintain the customer base', cost for credit monitoring (if
applicable),
> 'SPPINING' (no reference to fox news <S>), losing business focus, soft
> costs etc) it can be even much higher.
> 
> As you noted there are a lot of reasons for data breaches and here are
> some additional info for those who want to know
> 
> 39% of breaches are from employees (non-malicious)
> 16%  Hacker external
> 30% employees (malicious)
> 15% other
> 
> So everyone out there reading this, make sure your company's  name
(bottom
> line) isn't on the front page of NYT, Globe and Mail, The Financial
Times,
> etc. because of a breach.
> 
> Any other thoughts?
This message and any attachments are intended only for the use of the addressee 
and
may contain information that is privileged and confidential. If the reader of 
the 
message is not the intended recipient or an authorized representative of the
intended recipient, you are hereby notified that any dissemination of this
communication is strictly prohibited. If you have received this communication in
error, please notify us immediately by e-mail and delete the message and any
attachments from your system.


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to