08Feb2010 (UTC +8)

On Mon, Feb 8, 2010 at 22:50, fooler mail <[email protected]> wrote:
>
> On Fri, Feb 5, 2010 at 9:28 AM, jan gestre <[email protected]> wrote:
>> On the side note, Presidential candidates don't need to cheat at the
>> precinct level, remember that Congress will be the one to canvass the
>> results and eventually proclaim the winner, and you what that means....
>
> if there is an opportunity.. they will cheat at any level :->

In the Association of Certified Fraud Examiners (http://www.ACFE.org),
we often credit a researcher named Donald Cressey for his work in the
1950's that gave a remarkable insight on how the criminal mind works.
Mr. Cressey came up with the Fraud Triangle concept, based upon years
of scientific research. The Fraud Triangle simply illustrated that
when a criminal did a bad thing, 3 factors where always present.

First, "motivation" is what drives the criminal. Motivation examples
can be financial in nature (family relative is sick; or gambling
problems; extravagant lifestyle), or emotional pressure (ego; peer
pressure; lust for power, fame, and fortune).

Second, there is "opportunity". Opportunity simply is a situation or
condition where the attacker found it favorable to commit a crime. It
might be the victim is weak or vulnerable, or the criminal is stronger
& crafty, or all of the above.

"Rationalization" is the third angle in the Fraud Triangle.
Rationalization happens when the criminal mind comes up with a
seemingly acceptable reason on why the crime can or has to be done
--like thoughts about exacting revenge, or claiming what is right, or
being confident that he / she can get away with the crime, or so on.

                      ^
Opportunity   /   \   Motivation
                  /       \
                 -----------
            Rationalization

It is generally accepted principle that taking away one angle from the
Fraud Triangle, prevents a bad thing from happening. It is in this
context where one can audit source code to analyze the risks that the
AES is exposed to, find out if the security functions of the AES is
sufficient to counter those risks, and then verify if those
counter-measures work as expected --no more, no less.



Drexx Laggui  -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA
http://www.laggui.com  ( Singapore / Manila / California )
Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer
PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4  8363 FFEC 3976 FF31 8A4E
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to