Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Security Blues

Security Blues

Scheduled Pinned Locked Moved The Lounge
securityhelpquestion
14 Posts 10 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • V Vasudevan Deepak Kumar

    MehGerbil wrote:

    A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time.

    How about blocking logons from different IPs in a short period of time? That will discourage people from sharing ids right?

    Vasudevan Deepak Kumar Personal Homepage
    Tech Gossips
    The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep!

    P Offline
    P Offline
    Pualee
    wrote on last edited by
    #5

    It'll stop people from using the labs as well.

    V J 2 Replies Last reply
    0
    • L Lost User

      The thing that irritates me the most about IT security is that my efforts to protect people's jobs are often opposed by the people whose jobs I'm protecting. Because I work with student data there are a whole host of regulations - serious regulations - about what I can do with the data and how it must be managed. A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue. Maybe people like to lose their jobs over other people's malfeasance. I've had people high in manangement say that the rules aren't important and that if there is any blowback it will fall on their shoulders. Yeah, that's a nice story and all but I'm guessing I'd be crushed like a grape long before any poo-storm hit management. I'm supposed to believe a director wouldn't throw me under the bus to save his own arse? Right. This is why people have to keep email archives. :-D

      E Offline
      E Offline
      Espen Harlinn
      wrote on last edited by
      #6

      MehGerbil wrote:

      I'm supposed to believe a director wouldn't throw me under the bus to save his own arse?

      Not a religious type, are you? Well, you're probably right ...

      Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

      1 Reply Last reply
      0
      • M Mike Hankey

        Get everything in writing it's called CYA.

        VS2010/Atmel Studio 6.0 ToDo Manager Extension
        Version 3.0 now available. There is no place like 127.0.0.1

        E Offline
        E Offline
        Espen Harlinn
        wrote on last edited by
        #7

        :thumbsup: It's common sense, but then ... “It is the obvious which is so difficult to see most of the time. People say 'It's as plain as the nose on your face.' But how much of the nose on your face can you see, unless someone holds a mirror up to you?” ― Isaac Asimov

        Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

        M 1 Reply Last reply
        0
        • P Pualee

          It'll stop people from using the labs as well.

          V Offline
          V Offline
          Vasudevan Deepak Kumar
          wrote on last edited by
          #8

          I mean you can apply a bit of heuristics like frequent and concurrent IP logons. May not be a full-fledged foolproof at first shot. You can try rolling out a logon policy for a closed set of (trusted) users and start rolling out for others after gaining a bit of maturity.

          Vasudevan Deepak Kumar Personal Homepage
          Tech Gossips
          The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep!

          1 Reply Last reply
          0
          • E Espen Harlinn

            :thumbsup: It's common sense, but then ... “It is the obvious which is so difficult to see most of the time. People say 'It's as plain as the nose on your face.' But how much of the nose on your face can you see, unless someone holds a mirror up to you?” ― Isaac Asimov

            Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

            M Offline
            M Offline
            Mike Hankey
            wrote on last edited by
            #9

            Espen Harlinn wrote:

            “It is the obvious which is so difficult to see most of the time. People say 'It's as plain as the nose on your face.' But how much of the nose on your face can you see, unless someone holds a mirror up to you?”

            True enough and until it happened to me I didn't think it would be necessary.

            VS2010/Atmel Studio 6.0 ToDo Manager Extension
            Version 3.0 now available. There is no place like 127.0.0.1

            1 Reply Last reply
            0
            • L Lost User

              The thing that irritates me the most about IT security is that my efforts to protect people's jobs are often opposed by the people whose jobs I'm protecting. Because I work with student data there are a whole host of regulations - serious regulations - about what I can do with the data and how it must be managed. A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue. Maybe people like to lose their jobs over other people's malfeasance. I've had people high in manangement say that the rules aren't important and that if there is any blowback it will fall on their shoulders. Yeah, that's a nice story and all but I'm guessing I'd be crushed like a grape long before any poo-storm hit management. I'm supposed to believe a director wouldn't throw me under the bus to save his own arse? Right. This is why people have to keep email archives. :-D

              W Offline
              W Offline
              wizardzz
              wrote on last edited by
              #10

              MehGerbil wrote:

              A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue.

              Every time I have a party, I bring out my guns, pass them around. You know, to get some more prints on them.

              1 Reply Last reply
              0
              • L Lost User

                The thing that irritates me the most about IT security is that my efforts to protect people's jobs are often opposed by the people whose jobs I'm protecting. Because I work with student data there are a whole host of regulations - serious regulations - about what I can do with the data and how it must be managed. A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue. Maybe people like to lose their jobs over other people's malfeasance. I've had people high in manangement say that the rules aren't important and that if there is any blowback it will fall on their shoulders. Yeah, that's a nice story and all but I'm guessing I'd be crushed like a grape long before any poo-storm hit management. I'm supposed to believe a director wouldn't throw me under the bus to save his own arse? Right. This is why people have to keep email archives. :-D

                J Offline
                J Offline
                JimmyRopes
                wrote on last edited by
                #11

                MehGerbil wrote:

                This is why people have to keep email archives.

                You won't be there to defend yourself when you are blamed. :~

                The report of my death was an exaggeration - Mark Twain
                Simply Elegant Designs JimmyRopes Designs
                Think inside the box! ProActive Secure Systems
                I'm on-line therefore I am. JimmyRopes

                1 Reply Last reply
                0
                • L Lost User

                  The thing that irritates me the most about IT security is that my efforts to protect people's jobs are often opposed by the people whose jobs I'm protecting. Because I work with student data there are a whole host of regulations - serious regulations - about what I can do with the data and how it must be managed. A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue. Maybe people like to lose their jobs over other people's malfeasance. I've had people high in manangement say that the rules aren't important and that if there is any blowback it will fall on their shoulders. Yeah, that's a nice story and all but I'm guessing I'd be crushed like a grape long before any poo-storm hit management. I'm supposed to believe a director wouldn't throw me under the bus to save his own arse? Right. This is why people have to keep email archives. :-D

                  J Offline
                  J Offline
                  jschell
                  wrote on last edited by
                  #12

                  MehGerbil wrote:

                  and that if there is any blowback it will fall on their shoulders.

                  You can ask them to put that in writing. That protects you mostly as long as the regulations are not laws. If they are laws then still get it in writing, present that to law enforcement and get a record that you gave it to law enforcement (and did so promptly.)

                  1 Reply Last reply
                  0
                  • P Pualee

                    It'll stop people from using the labs as well.

                    J Offline
                    J Offline
                    jschell
                    wrote on last edited by
                    #13

                    Pualee wrote:

                    It'll stop people from using the labs as well.

                    How so? Logging out the first session when a second logs in is a common business idiom.

                    1 Reply Last reply
                    0
                    • L Lost User

                      The thing that irritates me the most about IT security is that my efforts to protect people's jobs are often opposed by the people whose jobs I'm protecting. Because I work with student data there are a whole host of regulations - serious regulations - about what I can do with the data and how it must be managed. A simple case in point is users sharing login ids. My systems log changes to records but if people are going to pass around user ids then the whole logging mechanism is a waste of time. I should think a person wouldn't want to get smeared with someone else's fraud, but I guess I'm all backwards on that issue. Maybe people like to lose their jobs over other people's malfeasance. I've had people high in manangement say that the rules aren't important and that if there is any blowback it will fall on their shoulders. Yeah, that's a nice story and all but I'm guessing I'd be crushed like a grape long before any poo-storm hit management. I'm supposed to believe a director wouldn't throw me under the bus to save his own arse? Right. This is why people have to keep email archives. :-D

                      P Offline
                      P Offline
                      p51dfltln
                      wrote on last edited by
                      #14

                      and quite possibly why some companies have instituted an 'email age limit' policy..

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups