Skip to comments.
Stress afflicts security bosses
BBC News ^
| Tuesday, 15 March, 2005
| BBC News
Posted on 03/16/2005 4:08:46 AM PST by r5boston
Keeping computer viruses at bay is more stressful than divorce, warns a survey.
The research revealed how European technology bosses were coping with the growing number of hi-tech threats.
Although many firms had software in place to combat viruses, spam and phishing, it found few adequately protected against all threats.
The survey also revealed that many tech bosses would face dismissal if they let their firm fall victim to a serious security breach.
(Excerpt) Read more at news.bbc.co.uk ...
TOPICS: Technical
KEYWORDS: cybersecurity; pcvirus
1
posted on
03/16/2005 4:08:46 AM PST
by
r5boston
To: r5boston
By all means, let's not hold the software manufacturers, uh Microsoft, that market these security hole riddled packages accountable.
Let's blame the guy/gal doing their level best given budget and staffing restraints to guard the gates against any number and type of asymmetric attacks.
To: Dad2Angels
I also blame the idiot users who don't think twice about phishing attacks, replying to spam, or installing that ActiveX script because they think they need it to browse a website.
They think security is someone else's problem. That attitude has to change.
3
posted on
03/16/2005 5:30:27 AM PST
by
Terpfen
(New Democrat Party motto: les enfant terribles)
To: Terpfen
That is a corporate mentality issue.
The first thing that needs to happen on that front is that the folks at the top need to grow a set and lay down concrete rules about such things that carry concrete penalties if violated.
I know this sounds harsh but once you've spent 72 hours straight cleaning up the worst of the problem and weeks afterward catching the stragglers you begin to understand the financial cost of being so lax.
To: Dad2Angels
By all means, let's not hold the software manufacturers, uh Microsoft, that market these security hole riddled packages accountable. Let's blame the guy/gal doing their level best given budget and staffing restraints to guard the gates against any number and type of asymmetric attacks.
Uh, get real. Many of these so-called "security bosses" have their heads up their asses and don't know what measures they should be taking against security threats. Examples ... allowing attachments to pass through the corporate email servers without being quarantined ... allowing their users to run with admin privileges ... not requiring adequate password policy ... not using an adequate firewall ... not filtering allowable user-browsable websites at the proxy ... not establishing corporate standards to establish allowable applications ... etc.
5
posted on
03/17/2005 1:16:35 PM PST
by
Bush2000
To: Dad2Angels
The first thing that needs to happen on that front is that the folks at the top need to grow a set and lay down concrete rules about such things that carry concrete penalties if violated.
Absolutely! Rationally *implemented* corporate security policy can eliminate the vast number of threats. Trouble is, many companies either don't have such policy -- or they fail to implement it. You can't blame the vendor for that. That's just poor management.
6
posted on
03/17/2005 1:19:33 PM PST
by
Bush2000
To: Bush2000
Uh, I am real.
While your point about some security bosses is spot on, a large number of security holes are present in the software when it is released to the market.
It happens frequently and with little to no consequence to the software vendor.
As for corporate policies. Most security bosses can only suggest policy, it is up to their bosses to trust they know what they are talking about and implement their suggestions which many are reluctant to do due to PC BS. And I don't mean Personal Computer.
P.S.
They way you started your rebuttal was a perfect example of one with something up HIS ass.
Grow Up.
To: Dad2Angels
Uh, I am real.
No, you're not. You're blaming software vendors for some problems that legitimately belong to failure to implement appropriate corporate security policy.
While your point about some security bosses is spot on, a large number of security holes are present in the software when it is released to the market.
There will *always* be a large number of security holes in any software. Doesn't matter whether it's open or closed source.
They way you started your rebuttal was a perfect example of one with something up HIS ass. Grow Up.
8
posted on
03/17/2005 2:23:31 PM PST
by
Bush2000
To: Bush2000
By your logic a car manufacturer should not be held responsible if the front axle breaks every time a driver makes a left hand turn.
That driver should simply have exercised better driving discipline and stopped making lefts.
To: Dad2Angels
By your logic a car manufacturer should not be held responsible if the front axle breaks every time a driver makes a left hand turn.
Your analogy is flawed. You're actually because some kid jimmied the car door and took the car for a ride. In your mind, apparently, the car manufacturer should have provided a break-in-proof automobile; otherwise, it's "flawed".
10
posted on
03/17/2005 3:30:25 PM PST
by
Bush2000
To: Bush2000
I would disagree with your analogy also.
I can take steps to protect my car by locking the doors, placing it in my garage, using an alarm system, etc and admittedly many don't take these obvious steps and that's their problem.
However, if the manufacturer sends it's cars out of the factory with so many vulnerabilities that an industry is created that does nothing else but research into where those vulnerabilities are and development of products to protect against those vulnerabilities, I'd say the SW vendors are neglecting to do due diligence during the development and testing of their products.
In the end there is more than enough blame to go around on this topic. But your seeming refusal to place any of the responsibility on the SW vendors is shortsighted and can only lead me to one conclusion.
You are somehow involved in the SW industry, most likely the development end somewhere.
To: Dad2Angels
I would disagree with your analogy also.
Of course you do. You're disagreeable.
I can take steps to protect my car by locking the doors, placing it in my garage, using an alarm system, etc and admittedly many don't take these obvious steps and that's their problem.
That's precisely what I'm talking about! Those "steps" are analogous to "rational implementation of security policy"! Nobody ever claimed that the car was break-in-proof. But you [unrealistically] expect it to be when you blame GM or Ford or whoever made it.
However, if the manufacturer sends it's cars out of the factory with so many vulnerabilities that an industry is created that does nothing else but research into where those vulnerabilities are and development of products to protect against those vulnerabilities, I'd say the SW vendors are neglecting to do due diligence during the development and testing of their products.
Consider it this way. If a thief spends his entire day thinking of ways to break into your car, there's very little that you can do to prevent him from doing so -- other than widening the perimeter of security around your car. As you said, lock it (use strong passwords), place it in a garage (firewall), use an alarm system (monitoring and notification), etc. You don't blame the car manufacturer for people discovering that, if you put a crowbar in the door jam, it's possible to pry it open. You don't blame the car manufacturer for people discovering that twisting a small piece of wire will open the lock. You don't blame the car manufacturer for people discovering that if you hit the window with a blunt instrument hard enough, it will crack and allow them to enter the vehicle.
In the end there is more than enough blame to go around on this topic. But your seeming refusal to place any of the responsibility on the SW vendors is shortsighted and can only lead me to one conclusion.
Manufacturers should do their due diligence to secure their products; however, you're being totally unrealistic about this whole thing. Anybody who thinks it's possible to ship with zero bugs is loony. So NO software would ever be good enough.
You are somehow involved in the SW industry, most likely the development end somewhere
Duh. Do you think? /SARCASM
12
posted on
03/18/2005 9:27:13 AM PST
by
Bush2000
To: Bush2000
Caffeine is not always our friend.
You may want to modify your intake.
P.S.
If you get out from behind your desk more often you may learn how to interact with PEOPLE on a level that makes you less obnoxious.
/end
To: Dad2Angels
Look, cube-dweller, I probably do a lot more interaction with people in the industry than you do. And the fact of the matter is that you're being unrealistic. *Every* OS and *every* application has serious security issues. That you seem to be oblivious to this fact indicates that you spend a little too much time in your cube.
14
posted on
03/18/2005 10:00:33 AM PST
by
Bush2000
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson