W dniu 2016-05-14 o 01:47, Tony Harminc pisze:
On 13 May 2016 at 19:19, R.S. <r.skoru...@bremultibank.com.pl> wrote:
It's absurd. Completely ridiculous.
Pendrive from IBM is not likely to have a virus.
True. But it's related to the argument that airline pilots should not
be security screened at airports. Of course it's not about screening
pilots, but rather those who *look like* pilots.

If you buy in quantity, I'm sure these people will put a logo of your
choice on your "pen drive":

http://hakshop.myshopify.com/products/usb-rubber-ducky-deluxe

Or probably the clip is a standard size, and an IBM one can easily be
substituted for the duck one.

The relationship to the pilots case is simply wrong.
Yes, there are USB with a virus, there are also "hardware infected" pendrives.
So?
Simple security sealing resolve the problem of media genuity. As with the tapes. Remember, the tape could contain malicious code also! Rhetorical: Do you security-check your installation tapes? What about IBM-delivered DVDs???

When talking about infected code on USB stick (including USB stick HW) we should consider the following cases: 1. Modified/infected z/OS code. In this case it doesn't matter what media is used. The same risk is for tape or DVD. Indirect Internet download is also somehow affected. 2. The malicious code is intended to infect the workstation. The methods for attack are well known:
2.1 autorun.inf - should be disabled as a general rule.
2.2. virus.exe or boobs.exe - phising.
2.3. HW code. More complex.
Fortunately methods 2.1 and 2.2 cannot infect HMC. The last one is very unlikely.

Last but not least: such attack would have to be dedicated to given company. With very doubtful effect in case of succesful infection. It would be extremely hard time consuming and expensive. It is much cheaper to bribe or blackmail some insider.

BTW: It remains me Tylenol affair from early eighties.

--
Radoslaw Skorupka
Lodz, Poland






--
Treść tej wiadomości może zawierać informacje prawnie chronione Banku 
przeznaczone wyłącznie do użytku służbowego adresata. Odbiorcą może być jedynie 
jej adresat z wyłączeniem dostępu osób trzecich. Jeżeli nie jesteś adresatem 
niniejszej wiadomości lub pracownikiem upoważnionym do jej przekazania 
adresatowi, informujemy, że jej rozpowszechnianie, kopiowanie, rozprowadzanie 
lub inne działanie o podobnym charakterze jest prawnie zabronione i może być 
karalne. Jeżeli otrzymałeś tę wiadomość omyłkowo, prosimy niezwłocznie 
zawiadomić nadawcę wysyłając odpowiedź oraz trwale usunąć tę wiadomość 
włączając w to wszelkie jej kopie wydrukowane lub zapisane na dysku.

This e-mail may contain legally privileged information of the Bank and is 
intended solely for business use of the addressee. This e-mail may only be 
received by the addressee and may not be disclosed to any third parties. If you 
are not the intended addressee of this e-mail or the employee authorized to 
forward it to the addressee, be advised that any dissemination, copying, 
distribution or any other similar activity is legally prohibited and may be 
punishable. If you received this e-mail by mistake please advise the sender 
immediately by using the reply facility in your e-mail software and delete 
permanently this e-mail including any copies of it either printed or saved to 
hard drive.

mBank S.A. z siedzibą w Warszawie, ul. Senatorska 18, 00-950 Warszawa, 
www.mBank.pl, e-mail: kont...@mbank.pl
Sąd Rejonowy dla m. st. Warszawy XII Wydział Gospodarczy Krajowego Rejestru 
Sądowego, nr rejestru przedsiębiorców KRS 0000025237, NIP: 526-021-50-88. 
Według stanu na dzień 01.01.2016 r. kapitał zakładowy mBanku S.A. (w całości 
wpłacony) wynosi 168.955.696 złotych.


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to