Tim Cook wrote:

>On Sat, 2004-03-06 at 14:17, Tim Churches wrote:
>  
>
>>In general, caches should be
>>held on encrypted filesystems, either on-disc or in-memory, with the
>>keys (or a key to the keys) to the encryption/decryption managed by a
>>daemon which purges the keys from memory when asked (eg locking the
>>device) or automatically after a short period of disuse.
>>    
>>
>
>Well, now that would certainly be a secure way to handle caching.  If I
>were worrying about national secrets.  
>
>Do you go to this extreme now (as a manager) when doing your risk
>assessments?  I am wondering what the total (additional) costs of system
>design and hardware resources is when these facilities are implemented. 
>
>I think that in most cases we can reliably depend on locked doors and
>holding people responsible for protecting data they are entrusted with. 
>I will agree that security training needs to include this awareness so
>that users know how to properly store each of these devices when not in
>use.
>
>  
>
A well known study in Harvard medical school (I think) showed that 
putting the message "Do not inappropriately access patient data - all 
your accesses are being logged" on clinician screens a few times a day 
resulted in a drop to near 0 of inappropriate access. No other 
technology was used


- thomas


-
If you have any questions about using this list,
please send a message to d.lloyd at openehr.org

Reply via email to