Chris Craddock writes:

True enough and this is part of the "dirty little secret" we live with.
Security is only as good as the weakest link. Most systems run a mix of
IBM, ISV and home-grown software and it is almost laughably easy (for a
guy like me anyway) to find holes in that environment.

This is the case for many of us, and I am not sure that it is nearly so problematic as it is usually represented to be.

Most large cities contain locksmiths who, given physical access, can open bank vaults almost at will; but they do not use their skills to burglarize banks; they open vaults only in response to legitimate, elaborately authenticated requests. It is indeed arguable that if bank vaults are to be prevalent locksmiths who can open them in extremis are essential.

Insecure shops are highly problematic, but I know of shops of this kind in which security measures of various plausible-to-laymen kinds (and others represented, disingenuously, as useful by those who know better) have been effective only in hamstringing operations and performance.

I have just looked at a set of 23 security recommendations for a z/OS shop, prepared by an eminently respectable public accounting firm, of which three were reasonable, although not very important, and 20 were preposterous; and the sour tone of this post is perhaps attributable to that experience.


John Gilmore
Ashland, MA 01721-1817
USA

_________________________________________________________________
Get in the mood for Valentine's Day. View photos, recipes and more on your Live.com page. http://www.live.com/?addTemplate=ValentinesDay&ocid=T001MSN30A0701

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to