Category Archives: Security

Posts related to security.

Threat: Sam the Disgruntled Employee

The last post looked at programmers. Now let’s consider another active threat:   I’m going to assert that Sam is the second greatest security you face. (We will encounter the greatest thread in a few more posts.) Depending on who … Continue reading

Posted in Security | 2 Comments

Threat: Tom the Programmer

The previous article explored the threat system administrators pose; now let’s look at another internal threat: No discussion of system integrity and security would be complete without Tom. Without the applications, tools, and utilities that Tom writes, computers would be … Continue reading

Posted in Security | Leave a comment

Threat: Fred the System Administrator

We last looked at the threat of a manager determined to make the business succeed; now let’s consider an inside threat: In terms of threat potential, Fred is off the charts. In order to do his job, he has essentially … Continue reading

Posted in Security | Leave a comment

Threats: William the Manager

In our last post we looked at the threats a security czar can create. Let’s now look at another surprising threat: William is concerned with his group getting their job done. He is under budget pressure, time pressure, and requirements … Continue reading

Posted in Security | 2 Comments

Threats: Stan the Security Czar

Our previous posts looked at the stereotypical threat of hackers. Let’s now look at some less obvious threats: What?!? The security guy is listed as a threat to system security? Absolutely. Stan is knowledgeable. He knows that the world is … Continue reading

Posted in Security | Leave a comment

Threats: Sphinx the Script Kiddie

Our previous post considered skilled hackers – but not all hackers are skilled… Sphinx the Script Kiddie Unlike Igor, Sphinx doesn’t have deep skills or knowledge. But he does have access to very powerful cracking toolkits that other people have … Continue reading

Posted in Security | Leave a comment

Threats: Igor the Hacker

The previous post explored different types of threats. Now that we’ve taken a look at what some of the threats are, let’s look at who might be behind these threats. One goal is to determine who the greatest threat is. … Continue reading

Posted in Security | 4 Comments

Threats

The previous article looked at operational integrity. Let’s shift back to a security discussion and take a look at threats. Any intelligent discussion of threats starts out by looking at what you are protecting, how it can be threatened, and … Continue reading

Posted in Security | Leave a comment

Operational Integrity

The previous article looked at application and system integrity – let’s now look at the next level of integrity. Introducing Operational Integrity Let’s take the next step in integrity and look at the integrity of running systems over the life … Continue reading

Posted in Security | Leave a comment

Application and System Integrity

The previous article looked at user needs, which include the integrity of the applications and systems they are using. We have defined integrity as one of the three pillars of IT. Now let’s define what we mean by application and … Continue reading

Posted in Security | Leave a comment