Security's Shaky State 184
Ant writes "According to InformationWeek, Information Technology (I.T.) security professionals say when it comes to security, most I.T. departments are underfunded, understaffed, and underrepresented.
Resourceful I.T. security professionals are getting the job done, but their efforts have been hampered by undersized staffs and underfunded budgets that limit choices ranging from what products they buy to the vendors they work with."
No one notices a well done security job... (Score:5, Insightful)
Likewise, the security side of an I.T. department is the sort of job that is hard to justify to people who assume that if they don't notice results, the job isn't really doing much.
Ah the glory of an invisible job.
-JMP
Re:No one notices a well done security job... (Score:5, Insightful)
Re:No one notices a well done security job... (Score:5, Interesting)
I've experienced worse. At one company I worked at, I warned of the pitfalls of a particular implementation my boss had been sold on. I was ignored. When the problems I predicted showed up, I was then blamed for creating them.
I quit that job as soon as a chance to move to a reasonably solid company came along...
-JMP
Re:No one notices a well done security job... (Score:5, Funny)
Re:No one notices a well done security job... (Score:5, Insightful)
Thanks, but I did gain an important bit of wisdom working there. The company brought in a supposedly hot shit developer to build systems. In departmental meetings where we went over our current projects, he was never interested in hearing about anyone else's project, but more importantly he got defensive when asked questions about how he dealt with various potential pitfalls. It turned out that he usually simply didn't deal with the pitfalls.
It's no wonder that the project managers dreaded having their projects assigned to him, as they would not only take longer to get to launch, but he would rush things past testing because he presumed himself to be infallible. His projects therefore always launched with bugs. (We're talking basic things here, like web apps for thousands of concurrent users that couldn't handle concurrent requests.)
Not only did I come away understanding the importance of bouncing ideas off others, but ever since that experience, I'm overly self-conscious about making sure to listen carefully to questions asked by people who aren't immersed in my projects. I find that those questions can often save me great deals of aggrivation later in the dev process. I don't want to be a master-of-the-universe hot shit developer. I want to build things that work.
-JMP
Re:No one notices a well done security job... (Score:4, Insightful)
Document EVERYTHING in cases like this. Offer advice in the form of an e-mail, print out a copy of the e-mail and file it somewhere safe (like at home). Also never delete the e-mail you sent.
Then when the stuff hits the fan you can defend yourself at the time in public and send another follow up e-mail including the original to back it up to whoever needs to know.
This doesn't work if it's the owner being the jerk but it does cover your butt if a supervisor's trying to push the blame down to save him/herself.
Re:No one notices a well done security job... (Score:3, Insightful)
Of course, this opens the door for them to say you violated retention policy and use that as an excuse to fire you, but that happens you can be assured that they place more value on winning the blame game than on succeeding in the industry. Smal
Re:No one notices a well done security job... (Score:3, Interesting)
Props for looking to the future, major negatives for not thinking out their direction.
I, well before implementation, pointed out that since this was WWW based, and our office connected to the web via an office about a thousand miles away, to connect then to an office about a mile away, casual lunch web surfe
Re:No one notices a well done security job... (Score:2)
Re:No one notices a well done security job... (Score:2, Insightful)
Re:No one notices a well done security job... (Score:2, Interesting)
There are a lot of career hazards with this one. I unfortunately became the nay-saying manager at a previous international telecom company a few years ago when I'd raise concerns about things like a calling card switch that:
- had a default load of SCO with no patches
- patches were prohibited because "they messed up the calling card soft
Re:No one notices a well done security job... (Score:4, Interesting)
I was able to win the battle with corporate security after they sent in the outside security auditors.
Outside audit showed nothing vulnerable (for whatever that's worth)
Inside auditor then came to our office for further (second opinion) audits
Joke is that we were all using the same tools (nessus,nmap,etc) to different effect.
Re:No one notices a well done security job... (Score:2)
Re:No one notices a well done security job... (Score:2)
Also, with closed source security applications claiming anyhting under the sun as well as operating system bugs that let websites/emails trick users into clicking a link that gives access to the entire system wich could then be used to access the entire network. I'm not saying open source
Re:No one notices a well done security job... (Score:3, Interesting)
Re:No one notices a well done security job... (Score:2)
When are people going to learn that insurance companies arent competitive anymore! They are all re-insuring each other, which essentially pushes silent collusion. This industry just rakes in teh cash and screws everyone else. No More Insurance.
Re:No one notices a well done security job... (Score:2)
Ah the glory of an invisible job.
Not only is the job of security invisible, it's effective to the degree that it's invisible! Thus, the better job IT security does, the less likely that they'll get future funding!
Talk about working yourself out of a job....
Re:No one notices a well done security job... (Score:2)
Re:No one notices a well done security job... (Score:2)
That's a common theme with all loss control divisions. All of the major performance measures are trailing indicators - they're only measurable in the event of a failure. You guys should look around and take a leaf out of the older loss control disciplines' books.
Safety, reliability, risk management etc all have positive performance measures available and in use. Put together a dashboard of leadi
Re:No one notices a well done security job... (Score:5, Insightful)
Here's a possible fix for that situation: Document and present to your bosses the nature of what you are preventing.
Gather information about sites that are less fortunate or less competent than your own. Make sure that your boss knows when your competitor's Web site gets vandalized, or when some well-known business starts spewing out virus spam. Provide information about the specific techniques that you used which kept that from happening to your site.
"In May of 20x6, businesses and home users across the Internet were hit by the Quigmorf worm, which was reported on the front page of the New York Times as causing $25 billion in damage. Our mail server anti-virus filtering rejected an average of 16 copies of this worm per second over the worst day of the outbreak."
Disseminate periodic alerts about viruses that have stricken other sites, but which your own defenses are ably filtering out. Couch these in the language of protecting your users from threats they may face on other (and hence lesser) networks.
"This Monday, Snarkashvili Anti-Virus discovered a new virus known as 'Quigmorf'. This virus infects Windows systems by sending email messages with a subject line of 'I love Quigmorf, click here to see why!' Infected systems become very slow and send out thousands of viruses to other email users. While our mail server anti-virus program is blocking Quigmorf, your home ISP may not be. Be sure to delete any messages with this subject line without opening them."
Instrument your systems. Gather logs and present them in understandable form. Bosses know what a quarterly report is, and they can understand claims such as:
"In 4Q05, our mail server blocked an average of 100 spam and 50 viruses every minute. This is a 25% increase over last quarter, and a 50% increase over last year. Spam complaints to spam@oursite.net are down by 65% over last year on a total email volume of 30% more messages. We attribute the improvement to the free open-source anti-spam and anti-virus programs that we installed last quarter."
If worse comes to worst, you could always try talking time and money:
"Our mail server blocks 100 spam every minute -- all day, every day; during working hours and after hours. It takes approximately 3 seconds for an employee to look at a message, recognize it as spam, and press the Delete key. This means our mail server does the work of more than twenty full-time employees dedicated to doing nothing but deleting spam."
It's true! (100 spam / minute) * (1 minute / 60 sec) * (3 person*sec / spam) = 5 person, but a person only works less than 1/4 of the time (8 out of 24 hours, 5 out of 7 days) whereas a mail server works 24/7.
Re:No one notices a well done security job... (Score:2)
Re:No one notices a well done security job... (Score:2)
Yet these same people do see a need for keys and locks and swipe cards and security guards. Why do they think network security is any less important than physcial security?
Re:No one notices a well done security job... (Score:2)
This isn't a problem - this is a good thing. Do you want to work for a company where the CFO has priorities other than the best spending of the company's money? Hell no.
The problem here is one of speaking the correct language. Rather than saying "we need X", do a formal ROI. Docume
Simple Reason (Score:4, Insightful)
Re:Simple Reason (Score:5, Insightful)
Until these companies are forced to care about their customer's data (and customers aint doing shit about it at the moment), they won't.
Re:Simple Reason (Score:2)
If you want to handle credit cards in the future, you had better be protecting the card data appropriately now. Penalti
Re:Simple Reason (Score:3, Insightful)
Re:Simple Reason (Score:5, Insightful)
But they certainly made no such foolish rule as "YOU MUST STORE the data AND encrypt it." If anything, that was a misread at your company of "IFF you must store the data THEN you must encrypt it." Their guidelines are sound. The Visa cryptographers I've met with have been really sharp, and wouldn't allow a chump mistake like that to creep in.
Re:Simple Reason (Score:2)
Re:Simple Reason (Score:2)
Here's the way we phrased that particular question in our doc:
"Is critical data (credit card numbers, passwords, etc.) encrypted before storage?"
You might want to talk to your PCI people. The idea is to secure your data, not create holes.
Re:Simple Reason (Score:2)
The difficulties of PCI are in the:
A. Interpretation - Many companies have been passing audits with "compensating controls," which has meant stricter perimeters, intrusion detection, app firewalls, etc. The auditors are saying this won't fly anymore, but we haven't seen a full realization of that in the mar
Responsible for Customer Data (Score:2)
If the perps are ever identified and apprehended they should be severely punished civil & criminal.
Re:Responsible for Customer Data (Score:2)
Re:Simple Reason (Score:2, Flamebait)
I just want to get this straight:
1) When a customer's data (credit card info, PHI, etc) is illegally duplicated it's stealing and all possible security measures should be taken to prevent this crime.
2) When a content producer's data (song, movie, software, etc) is illegally duplicated it's only been copied, no real harm was done, and the content producer should just ease up.
Yes I realize that the intent of content producer's is to propagate their data (through legal
Re:Simple Reason (Score:4, Insightful)
Having been a server admin before doing security, I can tell you that the two jobs are very similar. When things are done correctly, the suits rarely know who you are, what you do, or why your job is important. Because of that, it can be extremely difficult to explain why you need $100k for firewalls or $50k for new servers. C'est la vie.
Re:Simple Reason (Score:2)
That is why you do your job poorly or at least let certain things "happen".
On a phone conversation at MegaCorp
Boss: Why are all my emails missing?
Security Advisor: Ummm... *randonly punches keys on keyboard* Looks like you were hacked!
Boss: Oh noes! Why didn't you stop this!
Security Advisor: We could have if you gave us a purchase order for a new device I've been wanting.
Boss: Um..
No pretty pictures (Score:3)
SOX (Score:5, Insightful)
Managers and Execs start taking IT security a hell of a lot more seriously when they realize they can go to jail if they're implicated in fraud.
To comply with SOX, you have to document all your procedures, all your data flow, and make it available to gov't regulators. You also have to document what holes you're aware of in your systems and how you plug them.
Whistleblowing is quick, easy, anonymous, and DEVESTATING.
SOX ROX.
Re:SOX (Score:2)
Looking at it briefly, it looks like this would only apply to IT dealing with financial data, and only of public firms. I am still not sure what "this" is exactly, but that's why IANAL.
SOX - Important note (Score:3, Informative)
Re:SOX (Score:2)
My response to this:
Fine. SOX is optional. But you forfeit coverage under Corporate Bankruptcy law. In other words; if you choose not to comply with SOX, you don't qualify for Bankruptcy Protection, should you need it, and you're responsible for all the debts your company incurs when you drive it into the ground by stealing.
Seems like a fair deal to me.
Re:SOX (Score:3, Funny)
After that, head out to SourceForge.net or volunteer at local church/school.
All the money in the world is not enough. (Score:3, Insightful)
There's not much you can really do about it. You can buy all the "security" in the world and the next M$ worm will still take out your servers and your desktops. The only thing more staff does is make the recovery faster, but the limit is how fast Microsoft themselves fix the real problem. Beyond that, you block ports and services until things go away, which is not much better than broken.
At big companies, the problem is NOT a lack of resources, it's resources poorly spent. The quoted ratio is 1:5, one Unix admin can do the work of five Windoze admins.
Re:All the money in the world is not enough. (Score:2)
Re:All the money in the world is not enough. (Score:2)
So, the average IT manager at the average big company has a 5/6 chance of having a Windows admin background and will get feedback on technical and business decisions from 5 Windows admins and 1 Unix admin?
That pretty well sums it up where I work, too.
Re:All the money in the world is not enough. (Score:2)
ideally you might also wan't to stop outbound from servers to desktops as well although that may be unfeasible.
Engineers dont understand business (Score:3, Insightful)
Re:Engineers dont understand business (Score:2)
Re:Engineers dont understand business (Score:2)
Re:Engineers dont understand business (Score:2)
And what are these "long-term" bucks you speak of?
Overprivileged workers (Score:5, Insightful)
There was a day where staff were wary of computers, and treated them with respect. Those days have long past... all they're wary of is that weird IT guy who tries to tell them what to do with their machine.
Re:Overprivileged workers (Score:2)
Almost every programmer I know uses an IM client as part of their job, communicating with the rest of the team; some of them use them to communicate with clients. The only exception I can think of to this is my boss, who didn't use one even when he was a programmer and isn't about to start now that he's Head of Development.
Kazaa, etc I agree with - but I think you're being a little short-sighted railin
Re:Overprivileged workers (Score:2)
Re:Overprivileged workers (Score:2)
Exactly. I mean, imagine the loss to shareholders when somebody at Skype logs a typical programmer conversation:
joe: hey i got an error committing the tree
hnic: what?
joe: CVS: unable to write to file conf/variant/noref
hnic: okay, it's owned by frank still.
joe: ill send an email to ops to get them to change the group on the directory
hnic: call them, I want this done today - we can't make a new release on a Friday
joe: okay, thx
Clearly
Re:Overprivileged workers (Score:2)
Clearly a firing offense for these two "cowboy coders"!!!
the thing is, you can get an internal IM client and use that.
Re:Overprivileged workers (Score:2)
Re:Overprivileged workers (Score:2)
Boss, I have a problem...
I got a call from the FBI that they wanted to meet with me regarding the use of the Kazaa program within our network. They think someone is downloading illegal music and kiddy porn. I was thinking we should block those programs to avoid liability, what do you think? Also, should we make it into a written policy just to be safe? I don't want to spend the next 2 weeks dealing with lawyers and law enforcement agents crawling through our networks.
Compromise (Score:2)
To that end, I've been showing secretaries how to right-click on a picture and set it as their wallpaper (that and stressed the importance of not downloading other software to do so). Five minutes, and a whole lot less potential problems in the future. As a bonus for the secretary, she found a picture of her grandkids in her emai
Where's the problem? (Score:2)
Re:Where's the problem? (Score:2)
It's a complete lack of ethics culturally that allows people to do things like this. It's how much you can get away with without getting caught (getting hacked), rather than "doing it right" as you say. You can't do it right without the staff.
And maybe that isnt a bad thing (Score:5, Insightful)
Security people need to understand that not every risk has to be avoided. Many risks are an acceptable trade off to allow the business to be efficient. Honestly, I want my security team to be a little paranoid...but I want their manager to have a good understanding of the impact security policies can have on the people who do the things that bring money into the company.
Re:And maybe that isnt a bad thing (Score:2)
Most businesses benefit from short term cross-posting of managers into semi-related departments, or even better, putting the managers in with the regular employees.
Lots of big name Corps & Co's do this. It lets managers see things from more than one perspective which, I hope, lets them do their jobs better.
If you have good managers, training works.
For most ... (Score:2)
For most CIOs, their understanding of security doens't extend further than users having local admin rights, spam, viruses and spyware. Other tha
Well, that's a shocker. (Score:2, Flamebait)
Sounds like the IT guys interviewed here took a cue from the nurses' union, which complains of "understaffing" every time you turn around, so they can get more members.
THAT wrongheaded crap gets modded up?! (Score:2)
Has sulli ever been to a hospital and seen how long it takes for a nurse to get to a patient now? I've been there and seen it in person. These nurses aren't lazy, there simply are too few of them for all the patients on a given floor.
Here's some information for sulli to read and be educated.
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2 001/08/16/ED211776.DTL [sfgate.com]
Now, as for IT security, may sulli's credit card data be guarded by companies r
Read your own link. (Score:2)
Newsflash! Unions look out for their own members, and try to get more. It's called acting in their own interest.
Fair enough. (Score:2)
http://www.cbsnews.com/stories/2003/01/17/60minute s/main536999.shtml [cbsnews.com]
http://archives.cnn.com/2001/HEALTH/05/07/nursing. shortage/ [cnn.com]
I guess this means nurses own the media, universities and every other organization that has measured nurse to patient ratios in hospitals, too. Either that or the people who work there have been in the hospital at some time and have been blackmailed with the option of printing the nurses' side of the story or dying from poor care (how wude!).
In either case you'd be bet
Non-union nurses are complaining, too (Score:2)
Re:Well, that's a shocker. (Score:2)
I'm surprised you can't tell that they're acting in their own economic interest - just like the IT guys interviewed for this article.
I agree, but some of the issue lies with us... (Score:4, Informative)
If we could accurately quantify the benefits of what we want to do; and there MUST be a simple investment/payback model that any managoid can understand for anything you want to do. We are smarter than them, yet more often than not we bitch about how dumb the senior management is rather than use our smarts to convince them.
Trust me; do your research, present in simple terms the cost of the investment in (insert program here) vs. the cost of not doing it. Remember to quantify the risks in FINANCIAL terms. Lost productive hours; Loss of commercial advantage.
Take an active role in developing Key Performance Indicators for the organisation if it has such programs.
At the end of the day, baby boomers are, by and large, idiots as well as our bosses; they dont get the modern world. We have to present it to them in simple cost accounting terms. The more successful we are at communicating in these terms, the bigger our budgets will be.
Remember, businesses dont/shouldnt SPEND money... they should INVEST it; this is the way to convince and influence PHBs and managoids.
Anyway, just my $0.02AUD
err!
jak.
Missing data (Score:2)
Poor focus hurts too. (Score:3, Interesting)
I work as a software engineer for a very large company in the US. After 5 years with limited security and no virus scanning of email, the company network was beat down internally by every virus known to man. The "solution" was a very unfocused initiative. IT did stupid things like block every attachment via email (driving us nuts) while not making antivirus software mandatory. People would just plug a laptop in the network and spread everything they had on it. The IT department should have focused on handling the virus instead on trying to avoid them all together. They will get on the network anyways. Another "smart" thing they did was block access to Windows Update to make installing patches difficult. They had the staff, but not the knowledge and plan. That's more important in my opinion.
gasmonso http://religiousfreaks.com/ [religiousfreaks.com]Re:Poor focus hurts too. (Score:2)
"I work as a software engineer
how is working possible in the environment mentioned above ? or do you just hang around the coffe makin' machine ?
in the favour of your mental health, go get a proper job at a proper place.
how impossible can it be to drive network into firewalled subnets and add virus scanners ? plugged in laptops should have read-only access to linux/any-other-*nix based samba servers only, no direct connection to any other windows box in anyway. ah, who can count all that up here.
Here's why... (Score:2)
Here's why: They are outsourcing all IT jobs to India. In other words, they create the problem because after out sourcing, no new blood is attracted to fill the ranks of the IT colleges.
After creating the problem, they then lament about the problems they face...sheesh!
Vigilantism on the rise (Score:2)
There are entire groups of civilians devoted to bringing down criminals and other IT security nightmares. The guys and gals at 419Eater do a better job than eBay in policing fake escrow sites, and taking them down [legally most times I'd hope].
No surprise there... (Score:2)
I.T. is a cost center of _any_ business, not a profit center..
The other side of the coin... (Score:2, Interesting)
The other side of this, is that even when companies do have the budgets for these fancy-schmancy products from uber-repected vendors, it's often the users, and their lack of awareness or education about their role in security that's the weak link.
It shows why IT security staff is really employed. (Score:3, Interesting)
As far as I can tell, in quite a few companies IT Security staff are only employed as a gesture towards corporate risk management. In other words, as long as the gesture exists there is an apparent legitimate claim that effort was put in to mitigate a risk.
When (not if) the inevitable happens, it doesn't take a rocket scientist to work out whose head will roll. For those who haven't reached their operational caffeine level yet: it's not going to be an executive.
Having said that, I'm glad to come across more and more evidence that quite a few companies at least *DO* get it so maybe there is hope.
Bosses often follow their private agenda (Score:2, Interesting)
In other news... (Score:2)
Security has always been a problem, and probably always will, because there the risk is very difficult to quantify. "You should install XYZ because it'll probably maybe sorta keep out attackers." doesn't quite cut it when you ask for $500k to implement it. And the field is changing too quickly to commoditize certain security issues (A/V and simple encrypted point-to-point communications excluded).
Also, much of security is built upon black magic-- s
How about conducting the survey in the REAL world (Score:2)
The only folks I saw who were quoted in the article worked either for state/local government or a university. I'm sorry, but private industry is an entirely different animal. Perhaps out of your 1,500 respondents, folks, you should give us an idea of the breakdown.
Doesn't go far enough (Score:2)
There are two big problems with IT security... (Score:3, Insightful)
Second -- it's excruiating to separate the wheat from the chaff; there would appear to be a glut of IT security "professionals" out there if their resumes were to be believed, but in practice there are only a few gems to be found in that buzzword-compliant heap.
I'm a computational biologist by profession, but on occasion have had to deal with various projects that involved some sort of security (be it in establishing secure external collaborations, or securing proprietary data in various analytical pipelines). I've seen IT security heads come and go and I've yet to meet one that I felt knew more than me -- and they should know MUCH more than me!
I've met several true IT security professionals -- people that reeked of healthy paranoia and a truly fundamental knowledge of how things worked and interoperated. But, I've yet to see one in the wild looking for a job, much less hired by any company I've worked for.
I think you're simply seeing blissful ignorance exacerbated by a confusing pool of self-proclaimed security professionals and a dearth of truly competent personnel. It's hard work, and the value of it simply isn't clear until it's too late.
Used to work for City Government (Score:2)
I was the sole IT staff. For a major city in the North. My budget was $500.00 a month for any supplies or needed items. I was able to initiate a Network that spanned the city (from nothing) running most if not all of the cable and connections, building servers, initiating a domain presence, and also coding duties. I made 1/3 of what I make now. Without any of the responsibility I used to have then. IT is a 'loss leader' and Business (especially government for some reason) does not seem to be able to jus
Left out of the survey (Score:2)
Unions are a good idea (Score:5, Insightful)
However, when you look around and see people working 40+ hours a week, working on the weekends, working through the night, showering at work because they don't have time to go home, and being pushed through project cycles that are causing undo stress, something is wrong. The balance of power is not maintained and the employers are exploiting the engineers. That "great" paycheck you're raking in every two weeks suddenly comes out to barely double minimum wage when you break it down hourly. The cost to your family is also incredibly high as they don't have you around. It's a terrible situation.
So what's the solution? Well, the favored solution among the computer cognoscenti is to "go find yourself a new line of work". Why should someone who is good at their job be forced to take a different job just because the industry is unwilling to offer a fair wage as well as reasonable working conditions? It should not be a requirement that anyone who wants to work in the computer industry should also be forced to give up their personal lives. Unionizing is one very good way of forcing employers to bend to the needs of the employed.
It's unfortunate that so many people are against the idea. We ought to be working to live, not living to work.
That's when they offshore the work (Score:2)
And then these same employers quickly learn that offshoring is to data security what Al Qaeda is to peace, freedom and tolerance.
Ask Cisco and Citibank how they feel about that...
Re:That's when they offshore the work (Score:2)
No, they're taking the work offshore anyway, regardless of whether IT workers unionise. At least with a union, there'd be an organised, vocal opposition that could take the fight as far as was needed. There's a dispute involving ferry workers in Ireland at the moment - short story is that the company wants to fire them all and bring in Cypriots at below minimum wage, and they're being utt
Re:Unions are a good idea (Score:3, Interesting)
Most engineers are highly motivated peo
Re:Unions are a good idea (Score:3, Informative)
Otherwise you end up in a position like me - ove
Re:Unions are a good idea (Score:2)
Re:Unions are a good idea (Score:2)
Re:Unions are a good idea (Score:2)
I love playing Hacky Sack. I am extremely good at playing Hacky Sack, and have invested a lot of time and money in becoming proficient at it. Why should I, being good at playing Hacky Sack, be forced to take an unrelated job just because the industry is unwilling to offer a fair wage as well as reasonable working conditions?
T
Re:The value of the IT department (Score:4, Insightful)
That being said, the value of data has increased exponentially in the past 5 to 10 years and companies have not fully accounted for that rapid shift. I saw a study a few years ago that said at least half (but I seem to recall that it was more like 90%) of all business will go out-of-business within 1 year of a major data loss. That was before the
As for IT techs being underpaid, that has very little to do with the value of the work you are doing. It has much more to do with the number of you that are doing the work. It is a classic economic supply and demand problem: an abundance of paper technicians (MCSE, A+, etc), 18-year-old 'ub3r g33ks' and other money-driven late-comers to the
But what scares me more than a lack of real investment in security within the private sector, is the lack of investment in security by the public sector. I used to work in 'cyber security' for a major governmental research organization. The department has quite a reputation for the quality of its security infrastructure research, but the department is still only 10 regular employees and about 30 summer interns. And the department's budget was provided by and was a significant portion of the cyber security expenditures for a few of the major US departments. A major cyber security gaff at a blue chip would strain the US economy, but a major cyber security attack on public utilities could cripple North America (Canada, I'm looking in your direction too...).
I'm off my soap box now. Thank you for your attention. You may now resume your hacking activities.
Re:The supreme solution... (Score:2, Funny)
Whispering the information in someone's ear in the middle of an empty field. I'd like to see someone steal my credit card number then.
Re:The supreme solution... (Score:3, Insightful)
Re:That's Because "IT Doesn't Matter!" Anymore... (Score:2)
Re:That's Because "IT Doesn't Matter!" Anymore... (Score:2)
the problem isn't that we dont have enough people trying to clean
up the mess. the problem is the mess. although key distribution
is a difficult problem, the basic infrastructure needed to provide
relatively secure distributed services has existed for almost
20 years. and its still not in common use. the idea that reading
my mail can give a random person local administrative access on
my workstation is obscene at best.
hiring people to try to make things
Re:YOU GET WHAT YOU PAY FOR. (Score:2)
That would simply be a more accurate reflection of the day-to-day worth of those positions. But since those with no redeeming talents would simply switch from studying business management to IT (to chase the money), I could see this idea making things worse.
Re:ok what came between #1 and #3? (Score:2)
We've had a big increase in load due to mobile working and a shift from a PC as a calculator / word processor to PC as primary entry point for day to day work (all database driven, document management systems). All of these additional applications require supporting and with each iteration the reliance on reliable and fast WAN and internet links increases.
So while yes, a particular job gets easier and can be automated or delegated, there are however new appli