+1CharlesSent from a mobile; please excuse the brevity.
-------- Original message --------From: Alan Altmark <alan_altm...@us.ibm.com> 
Date: 5/14/19  11:28 AM  (GMT-08:00) To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: 
mainframe hacking "success stories"? Reading all of these posts has brought out 
the salient points of IT security:1. All the technology in the world won't help 
you if you don't use it.2. Stupid people can outwit a capable machine (SET 
SECURITY OFF).3. Z security builds on its long history and culture of talented 
people, effective processes, and robust products.  When all are fully engaged, 
its security mechanisms are really hard to beat.4. The bad guys have time on 
their side, often putting the good guys on the defensive.  The difference 
between the two is what protects you.  The more places you have those buffers, 
the better the protection will be.5. Sometimes obscurity is good.  Sometimes 
not.   It depends on what you are hiding and from whom.  But don't be upset 
when your secret is becomes known.  It shouldn't be your only defense.6. When 
someone possesses valid credentials to a system, only their activities while 
using them will tell you if they are Good or Evil.  This is the weakest part of 
all system security.   Humans are vital to IT security, yet are the weakest 
link, being both easiest to manipulate and capable of being compromised.   
(I've seen the movies; retinal scanners won't help.)    We try to recognize 
changes in system behavior to know when something is wrong, yet we pay little 
attention to human activities.  (How to recognize when your Db2 database is 
being surreptitiously unloaded in small bits over a long period of time.)7.  
The "Z" on the box doesn't make it more secure than any other platform (no 
miracles or magic).  It does, however, come with an impressive arsenal that you 
can use to make it so.  I would be comfortable saying that it is "more 
securable" than any other general purpose platform.  That encompasses both the 
types of security services and the difficulty in subverting them.8. Prevention 
is better than detection, but detection lets us know when our preventive 
measures have failed.9. Have you done all that is *commercially reasonable* to 
protect your data and your services?  All that is possible may not be 
reasonable in some contexts, so don't fall into that trap.  Understanding your 
liability (cost of loss) helps you assess "reasonable".10. Assume that nothing 
is perfect.  (You would be correct.)  Bad things happen to good people.  If you 
detect that, in spite of your best attempts, the unthinkable has happened, are 
you prepared to deal with it competently, calmly, and quickly?Alan AltmarkIBM 
Systems Lab Servicesz/VM 
Consultant----------------------------------------------------------------------For
 IBM-MAIN subscribe / signoff / archive access instructions,send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to