Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Security Blues

Security Blues

Scheduled Pinned Locked Moved The Lounge
securityhelpquestion
14 Posts 10 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L Lost User

    The thing that irritates me the most about IT security is that my efforts to protect people's jobs are often opposed by the people whose jobs I'm protecting. Because I work with student data there are a whole host of regulations - serious regulations - about what I can do with the data and how it must be managed. A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue. Maybe people like to lose their jobs over other people's malfeasance. I've had people high in manangement say that the rules aren't important and that if there is any blowback it will fall on their shoulders. Yeah, that's a nice story and all but I'm guessing I'd be crushed like a grape long before any poo-storm hit management. I'm supposed to believe a director wouldn't throw me under the bus to save his own arse? Right. This is why people have to keep email archives. :-D

    V Offline
    V Offline
    Vasudevan Deepak Kumar
    wrote on last edited by
    #4

    MehGerbil wrote:

    A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time.

    How about blocking logons from different IPs in a short period of time? That will discourage people from sharing ids right?

    Vasudevan Deepak Kumar Personal Homepage
    Tech Gossips
    The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep!

    P 1 Reply Last reply
    0
    • V Vasudevan Deepak Kumar

      MehGerbil wrote:

      A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time.

      How about blocking logons from different IPs in a short period of time? That will discourage people from sharing ids right?

      Vasudevan Deepak Kumar Personal Homepage
      Tech Gossips
      The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep!

      P Offline
      P Offline
      Pualee
      wrote on last edited by
      #5

      It'll stop people from using the labs as well.

      V J 2 Replies Last reply
      0
      • L Lost User

        The thing that irritates me the most about IT security is that my efforts to protect people's jobs are often opposed by the people whose jobs I'm protecting. Because I work with student data there are a whole host of regulations - serious regulations - about what I can do with the data and how it must be managed. A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue. Maybe people like to lose their jobs over other people's malfeasance. I've had people high in manangement say that the rules aren't important and that if there is any blowback it will fall on their shoulders. Yeah, that's a nice story and all but I'm guessing I'd be crushed like a grape long before any poo-storm hit management. I'm supposed to believe a director wouldn't throw me under the bus to save his own arse? Right. This is why people have to keep email archives. :-D

        E Offline
        E Offline
        Espen Harlinn
        wrote on last edited by
        #6

        MehGerbil wrote:

        I'm supposed to believe a director wouldn't throw me under the bus to save his own arse?

        Not a religious type, are you? Well, you're probably right ...

        Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

        1 Reply Last reply
        0
        • Mike HankeyM Mike Hankey

          Get everything in writing it's called CYA.

          VS2010/Atmel Studio 6.0 ToDo Manager Extension
          Version 3.0 now available. There is no place like 127.0.0.1

          E Offline
          E Offline
          Espen Harlinn
          wrote on last edited by
          #7

          :thumbsup: It's common sense, but then ... “It is the obvious which is so difficult to see most of the time. People say 'It's as plain as the nose on your face.' But how much of the nose on your face can you see, unless someone holds a mirror up to you?” ― Isaac Asimov

          Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

          Mike HankeyM 1 Reply Last reply
          0
          • P Pualee

            It'll stop people from using the labs as well.

            V Offline
            V Offline
            Vasudevan Deepak Kumar
            wrote on last edited by
            #8

            I mean you can apply a bit of heuristics like frequent and concurrent IP logons. May not be a full-fledged foolproof at first shot. You can try rolling out a logon policy for a closed set of (trusted) users and start rolling out for others after gaining a bit of maturity.

            Vasudevan Deepak Kumar Personal Homepage
            Tech Gossips
            The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep!

            1 Reply Last reply
            0
            • E Espen Harlinn

              :thumbsup: It's common sense, but then ... “It is the obvious which is so difficult to see most of the time. People say 'It's as plain as the nose on your face.' But how much of the nose on your face can you see, unless someone holds a mirror up to you?” ― Isaac Asimov

              Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

              Mike HankeyM Offline
              Mike HankeyM Offline
              Mike Hankey
              wrote on last edited by
              #9

              Espen Harlinn wrote:

              “It is the obvious which is so difficult to see most of the time. People say 'It's as plain as the nose on your face.' But how much of the nose on your face can you see, unless someone holds a mirror up to you?”

              True enough and until it happened to me I didn't think it would be necessary.

              VS2010/Atmel Studio 6.0 ToDo Manager Extension
              Version 3.0 now available. There is no place like 127.0.0.1

              1 Reply Last reply
              0
              • L Lost User

                The thing that irritates me the most about IT security is that my efforts to protect people's jobs are often opposed by the people whose jobs I'm protecting. Because I work with student data there are a whole host of regulations - serious regulations - about what I can do with the data and how it must be managed. A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue. Maybe people like to lose their jobs over other people's malfeasance. I've had people high in manangement say that the rules aren't important and that if there is any blowback it will fall on their shoulders. Yeah, that's a nice story and all but I'm guessing I'd be crushed like a grape long before any poo-storm hit management. I'm supposed to believe a director wouldn't throw me under the bus to save his own arse? Right. This is why people have to keep email archives. :-D

                W Offline
                W Offline
                wizardzz
                wrote on last edited by
                #10

                MehGerbil wrote:

                A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue.

                Every time I have a party, I bring out my guns, pass them around. You know, to get some more prints on them.

                1 Reply Last reply
                0
                • L Lost User

                  The thing that irritates me the most about IT security is that my efforts to protect people's jobs are often opposed by the people whose jobs I'm protecting. Because I work with student data there are a whole host of regulations - serious regulations - about what I can do with the data and how it must be managed. A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue. Maybe people like to lose their jobs over other people's malfeasance. I've had people high in manangement say that the rules aren't important and that if there is any blowback it will fall on their shoulders. Yeah, that's a nice story and all but I'm guessing I'd be crushed like a grape long before any poo-storm hit management. I'm supposed to believe a director wouldn't throw me under the bus to save his own arse? Right. This is why people have to keep email archives. :-D

                  J Offline
                  J Offline
                  JimmyRopes
                  wrote on last edited by
                  #11

                  MehGerbil wrote:

                  This is why people have to keep email archives.

                  You won't be there to defend yourself when you are blamed. :~

                  The report of my death was an exaggeration - Mark Twain
                  Simply Elegant Designs JimmyRopes Designs
                  Think inside the box! ProActive Secure Systems
                  I'm on-line therefore I am. JimmyRopes

                  1 Reply Last reply
                  0
                  • L Lost User

                    The thing that irritates me the most about IT security is that my efforts to protect people's jobs are often opposed by the people whose jobs I'm protecting. Because I work with student data there are a whole host of regulations - serious regulations - about what I can do with the data and how it must be managed. A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue. Maybe people like to lose their jobs over other people's malfeasance. I've had people high in manangement say that the rules aren't important and that if there is any blowback it will fall on their shoulders. Yeah, that's a nice story and all but I'm guessing I'd be crushed like a grape long before any poo-storm hit management. I'm supposed to believe a director wouldn't throw me under the bus to save his own arse? Right. This is why people have to keep email archives. :-D

                    J Offline
                    J Offline
                    jschell
                    wrote on last edited by
                    #12

                    MehGerbil wrote:

                    and that if there is any blowback it will fall on their shoulders.

                    You can ask them to put that in writing. That protects you mostly as long as the regulations are not laws. If they are laws then still get it in writing, present that to law enforcement and get a record that you gave it to law enforcement (and did so promptly.)

                    1 Reply Last reply
                    0
                    • P Pualee

                      It'll stop people from using the labs as well.

                      J Offline
                      J Offline
                      jschell
                      wrote on last edited by
                      #13

                      Pualee wrote:

                      It'll stop people from using the labs as well.

                      How so? Logging out the first session when a second logs in is a common business idiom.

                      1 Reply Last reply
                      0
                      • L Lost User

                        The thing that irritates me the most about IT security is that my efforts to protect people's jobs are often opposed by the people whose jobs I'm protecting. Because I work with student data there are a whole host of regulations - serious regulations - about what I can do with the data and how it must be managed. A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue. Maybe people like to lose their jobs over other people's malfeasance. I've had people high in manangement say that the rules aren't important and that if there is any blowback it will fall on their shoulders. Yeah, that's a nice story and all but I'm guessing I'd be crushed like a grape long before any poo-storm hit management. I'm supposed to believe a director wouldn't throw me under the bus to save his own arse? Right. This is why people have to keep email archives. :-D

                        P Offline
                        P Offline
                        p51dfltln
                        wrote on last edited by
                        #14

                        and quite possibly why some companies have instituted an 'email age limit' policy..

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups