I am interested in some of the points that you have expressed here Doug,
while this "traditional" approach to data management and security makes
sense, what I am concerned about is dealing with flaws in subjects, which
when talking about this particular approach, one has to rely on the
truthfulness of the subject.  What I am proposing in the last email was that
when you have two or more parties involved in the security process to
authenticate a machine, you start to minimize the effects of what seems to
be a variable we cannot control with programming.

 

A particular case in point that exemplifies this particular point is that
one that has happened in Canada in 2004 between two air carriers, Air Canada
and WestJet.

http://www.cbc.ca/canada/calgary/story/2006/05/29/ca-westjet-settlement-2006
0529.html

In this example, it's very easy to see that despite all the programming and
software controls and security policies, weaknesses still exist in things
programmers cannot control.

 

In this particular case it could have been as simple as the Sr. Executive of
Air Canada, could have created a user account in the website that did not
have an obvious connection with that employee, on the release of the
employee from his job, the IT staff removed his particular user name and
password to stop him from having the only known access to the system that he
was authorized to use.  They did not discover the additional user name and
password until the data was already stolen. By this time it's too late and
all the security policies and safe guards that was in place was circumvented
by the only thing we as programmers and system designers hope we can trust
mostly because it's one of the only variables we cannot control.

 

Paul

 

 

>From: [email protected] [mailto:[EMAIL PROTECTED] On
Behalf Of Doug Hale
>Sent: February 12, 2008 5:20 PM
>To: [email protected]
>Subject: Re: [delphi-en] I am looking for suggestions

> 

Paul,
I don't know how to respond, you have skipped lightly through so many 
subjects here, very few of which have much to do
an authentication protocol. It seems to me that what is needed most is 
"Security 101". Internet Security is an oxymoron not
because the technology doesn't exists, but because it is mostly ignored 
by the "Internet Community".



.

 
<http://geo.yahoo.com/serv?s=97359714/grpId=1997149/grpspId=1705115362/msgId
=17445/stime=1202854821/nc1=4507179/nc2=3848642/nc3=5202322> 
 



[Non-text portions of this message have been removed]

Reply via email to