SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices -- Ignore unavailable to you. Want to Upgrade?


To: Elroy who wrote (277510)3/1/2006 9:58:20 PM
From: RetiredNow  Respond to of 1572987
 
Elroy, I'm in the IT business. When it comes to IT security, operations has EVERYTHING to do with it. 95% of all hackers use some form of manual reconnoitering. People have the misconception that IT security is all about the code, but it's not. It's about have many layers of security and it's about locking down human access to not just the code, but the physical location of hardware. In other words, half the battle is obscurity. You don't want anyone to have visibility into how you are protecting your assets. Visibility is the first and most important step to hacking in.

Same thing goes with any security operations of any other sort, including port security. It's about the security apparatus, but it is also about locking down visibility and physical access. With an Arab company owning the operations of a port, you have just blown away both of those things. Now they have full visibility into most of the layers of security and they have physical access. From there it's a hop, skip, and a jump into figuring out how to exploit weaknesses.

I may not know much about port operations, but I do know a little about security principles. I studied them at a graduate level awhile back and have been in the business through IT for awhile now as well. So my opinion is a little more than hot air.