Re-read the information about the Target breach, and reconsider what I have
said.  This would not effect people outside of the US that do not use
credit  cards with magnetic strips.
 Its not just a matter of reading the strip directly, but as well as the
technology involved in how that information is further processed.

Ken, please pick a point are you going to choose to argue against/for: Is
it going to be adequate security; or is it going to be financially feasible
security?

--
Espi



On Mon, Dec 23, 2013 at 7:27 PM, Ken Schaefer <[email protected]> wrote:

>  How do you know “they should not have happened”? Perfect security is,
> pretty much, impossible. So, statistically, there will always be some level
> of breaches occurring, including some level of severe breaches. How do you
> know we aren’t at a level that makes monetary sense? Would you be prepared
> to, say, halve your income (because prices are double), simply to have 5%
> or 10% fewer security breaches?
>
>
>
> I don’t see how any recent serious breach is related to the use of
> magnetic stripe media or re-use of stolen phones, so I don’t really
> understand what you’re saying there.
>
>
>
> Cheers
>
> ken
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Micheal Espinola Jr
> *Sent:* Tuesday, 24 December 2013 2:20 PM
> *To:* [email protected]
>
> *Subject:* Re: [NTSysADM] RE: 40 Million CC breach at Target....
>
>
>
> I can only assume they dont, since historically (generally speaking) there
> have had serious breaches that should not have happened.  I've been
> involved with POS systems, banking systems, as well as various wifi-devices
> - and for years, there's been a lot of foolishness.  Business rarely does
> what it should - and instead only does what it has to, or can financially
> bet against.
>
>    - Banking: We (the US) still allow a system that relies heavily on
>    magnetic strip media.
>    - Telco:  We (the US) still allow a system were cell phones can be
>    stolen and reused.
>
>
>   --
> Espi
>
>
>
>
>
> On Mon, Dec 23, 2013 at 6:31 PM, Ken Schaefer <[email protected]> wrote:
>
>  Your rant presupposes that there isn’t “decent security” already in
> place. What evidence do you have that there isn’t?
>
>
>
> Cheers
>
> Ken
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *J- P
> *Sent:* Tuesday, 24 December 2013 12:43 PM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: 40 Million CC breach at Target....
>
>
>
> /rant on
>
> I have one question that rings in the back of my mind, they  (banks
> creditors merchants etc..)  charge all sorts of fee's,
> sometimes i'have heard of fees larger than a bill thats due-
> Why cant they take a piece of that to get some decent security into place?
>
> /rant off
>
> Happy holidays and a prosperous new year to all
>
>
>
>
>
>
>
>
>
>
> Jean-Paul Natola
>
>   ------------------------------
>
> From: [email protected]
>
>
> Date: Mon, 23 Dec 2013 08:10:19 -0500
>
> Subject: Re: [NTSysADM] RE: 40 Million CC breach at Target....
>
> To: [email protected]
>
>  *>>**That's a pretty fair analogy - and both statements are true. On the*
>
>
>
>
>
>
> *other hand, banking is much better understood - experience with banking
> goes back hundreds of years, with concomitant expertise in many fields in
> dealing with the risks in banking. The experience around computing is much
> more shallow, and the risks are not as well known, nor has nearly as much
> thought and practice gone into mitigating them.*
>
>
>
>
> Okay, so how about when banking relies upon computing?  Which risk profile
> comes into play, then -- the hundreds of years, or the shallow
> years/decades?
>
> Whether or not YOU use online banking, it is almost assured that your bank
> provides it and that others are aware of its existence.  Do you think that
> your bank is providing such a service without any reliance upon 3rd
> parties?  Do you think that because you aren't using the online services
> from your bank that your data would be unimpacted?
>
> (Hint: I'm sure that some of the people impacted in the Target breach, as
> in the TJX breach before it, were *not* online users)
>
>
>
>
> *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
> *Providing Virtual CIO Services (IT Operations & Information Security) for
> the SMB market…*
>
>
>
>
>
>
>
> On Sun, Dec 22, 2013 at 10:31 PM, Kurt Buff <[email protected]> wrote:
>
>  On Sun, Dec 22, 2013 at 6:59 PM, Andrew S. Baker <[email protected]>
> wrote:
> >>>Amazon's cloud is external to its customers - Amazon's staff,
> > procedures and infrastructure are a risk to its customers.
> >
>
> > That's as illogical a statement as the following:
>
> > XYZ Bank's technology infrastructure is external to its customers - XYZ
> > Bank's staff, procedures and infrastructure are a risk to its
> customers...
>
> That's a pretty fair analogy - and both statements are true. On the
> other hand, banking is much better understood - experience with
> banking goes back hundreds of years, with concomitant expertise in
> many fields in dealing with the risks in banking. The experience
> around computing is much more shallow, and the risks are not as well
> known, nor has nearly as much thought and practice gone into
> mitigating them.
>
>
> >>>Except when suborned or perverted by money, patriotism or blackmail:
> >
> http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220
> >
>
> > And how does you maintaining your infrastructure on-premises, but having
> to
> > rely on 3rd party telecommunications mitigate the above risk in any way?
>
> It's not just that specific incident - that's but one example, and in
> this specific instance, there was no remedy - trusted parties were
> subverted, and the same can happen in other fields. I'm not arguing
> for perfection here - just a recognition that complexity brings risk,
> and that keeping things simple and under more control is usually wise.
>
> Indeed, for some businesses, especially small ones with no IT staff,
> or very limited IT staff, going with a public cloud might make sense.
> But if a business has good IT staff, I'd venture that migrating most
> or all of their infrastructure to a public cloud isn't their best bet.
>
> Kurt
>
>
>
>
>

Reply via email to