tag:blogger.com,1999:blog-8377446.post7093563103870759369..comments2024-03-05T17:55:58.806+00:00Comments on Nanny Knows Best: The Danger of DatabasesKen Frosthttp://www.blogger.com/profile/13568488818950912374noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-8377446.post-51069220421793012482010-12-01T21:48:10.480+00:002010-12-01T21:48:10.480+00:00An excellent article, Ken, summing up the essentia...An excellent article, Ken, summing up the essential craziness of building these monster databases.<br /><br />The weak link in most IT security is the people who have legitimate access to the data, as Mr Potato Head explains!<br /><br />They talk about audit, but that just gives you a list of suspects for your leak.<br /><br />Remember the Police National Computer? That couldn't be abused, could it?<br /><br />http://www.express.co.uk/posts/view/209613/Policewoman-checked-out-secret-files-to-find-a-loverToy Trumpetnoreply@blogger.comtag:blogger.com,1999:blog-8377446.post-26830181073347970682010-11-30T19:49:10.769+00:002010-11-30T19:49:10.769+00:00Well, that is a concern too, but at the minute the...Well, that is a concern too, but at the minute there are more fundamental issues that need addressing before we can begin to worry about the known unknowns and the unknown unknowns! :)Mr Potato Headhttp://www.checkmystory.co.uknoreply@blogger.comtag:blogger.com,1999:blog-8377446.post-23154788027989222452010-11-30T15:05:57.899+00:002010-11-30T15:05:57.899+00:00Its not about now , its about a few years in the ...Its not about now , its about a few years in the future, nanotechnology, androids etc.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8377446.post-51857391381841167512010-11-30T13:01:20.121+00:002010-11-30T13:01:20.121+00:00That's not exactly true Anon. There are varyi...That's not exactly true Anon. There are varying levels of encryption that can resist varying levels of hacking by either undesirables or government agencies. However, I repeat myself!<br /><br />Regardless, that is neither here nor there in this case. The person from where the leak originated from was not hacking the database, he had been properly given access but then abused it.<br /><br />The problem here is as Ken says, poor design, poor access control and over-centralisation of data. A lesson for all our public controlled UK databases.Mr Potato Headhttp://www.checkmystory.co.uknoreply@blogger.comtag:blogger.com,1999:blog-8377446.post-67095887430383893632010-11-30T10:43:01.031+00:002010-11-30T10:43:01.031+00:00Databases are the modern version of the old USSR&#...Databases are the modern version of the old USSR's little red book.<br /><br />Information is power; every time you have contact with the state they ask for more information that in no way relates to your query. If you question the need for such information, they usually say it's to do with security checks or because the computer wants to know....I then advise them that the computer is only a machine and not a god and then ask why the person that was told to programme the computer feels the need for such information at which point, I am usually told that with out me giving the drone the info requested, they can't process my request.<br /><br />It seems to me that Nanny has set everything up to gather information about her citizens and yet sheeple still sing the mantra of "If you have nothing to hide etc etc..." Well, I have nothing to hide but I am sick to death of having to prove I have nothing to hide.Tonk.noreply@blogger.comtag:blogger.com,1999:blog-8377446.post-91473449695968481582010-11-30T10:27:18.543+00:002010-11-30T10:27:18.543+00:00What people seem not to understand about computers...What people seem not to understand about computers is that they are not secure, and the main reason is that Government won't allow them to be secure in case private citizens were to keep things on them the government can't read.Anonymousnoreply@blogger.com