linux operating commands and unix operating commands

The Risks of Bad Communication

 
Thread Tools Search this Thread
# 1  
Old 12-08-2009
The Risks of Bad Communication

I have been thinking about whether there are are any risks unique toremote facilities when it comes to a company's IT security design. This could be locations in different cities, near-shoring, off-shoring,etc.

From the article Bad Communication Can Create Risk, the author lists four risks mitigated by effective communication:
  • Increased employee resignations
  • Decreased employee productivity
  • Overt employee subversion
  • Inability to achieve company goals
From an IT security perspective, I will add:
  • Back doors
  • Data leakage
  • Malicious behavior (unintentional or otherwise)
The knowledge of being observed is itself a deterrent to bad behavior.  There is the Observer (or Hawthorne) effect,which "refers to changes that the act of observing will make on thephenomenon being observed."  Distance or separation from the companycould reduce efficacy of this control, and may embolden a subversivecontractor or employee.

Also, with a lack of proximity to the end users, you have no choice butto make assumptions to fill in the gaps during the requirementsgathering phase.  Like in Jurassic Park where the  geneticists filledgaps in the DNA with frog DNA:  we know how that turned out.  If thedesign proceeds on incomplete information, mistakes will undoubtedly bemade.  Architectural and security decisions should not be based on whatis "believed" to be the environment and usage behavior of a distantlocation.  The risk is that you may proceed with a false sense ofsecurity because the design and implementation are based on a false setof premises. 

There are also language and translation challenges, as well as timezone differences.  These factors can add layers of confusion andmisinformation, and can be additional challenges to effective security(see the four risks above).  Miscommunication could also lead users tounintentionally break security rules because they are not fullyunderstood, and because monitoring is not in full effect, the behaviorgoes on unnoticed.

Distance and communication challenges should inform the securitydesign.  Assumptions, due to lack of communication or sheerexasperation, should be kept to a minimum.  This may require a fewtrips to the distant location, as well as establishing a mechanism tovirtually visit (e.g. WebEx, video conference) the location on aregular basis.  The first step to good security is to candidly identifythe differences between a remote and home location, and to designaccordingly.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Why I get bad bad substitution when using eval?

Why I get bad replace when using eval? $ map0=( "0" "0000" "0") $ i=0 $ eval echo \${map$i} 0000 $ a=`eval echo \${map$i}` !!!error happens!!! bash: ${map$i}: bad substitution How to resolve it ? Thanks! (5 Replies)
Discussion started by: 915086731
5 Replies

2. Cybersecurity

Communication over firewall

Hey GUys, Once again I run in to problem and I am here for ur help. I have two sun(solaris) box on company LAN. One Unix Box is behind the firewall and the other one is Outside the firewall. The thing i need to do is remote display a graphic on Unix box outside the firewall to the Unixbox... (5 Replies)
Discussion started by: ajnabi
5 Replies

3. AIX

communication problems

hello i'v two aix servers 4.3. last night the goes down becuse electrical f problems. when the servers comes up i've notice that file /unix is gone. i've fix it and the problem fixed. after few hours the same crash becuse elctrical problems. file /unix is there , but now i've a... (0 Replies)
Discussion started by: ariec
0 Replies

4. Shell Programming and Scripting

Script to search a bad record in a file then put the record in the bad file

I need to write a script that can find a bad record (for example: there is date field colom but value provided in the file for this field is N/A) then script shoud searches this pattern and then insert the whole record into the bad file. Example: File1 Name designation dateOfJoining... (2 Replies)
Discussion started by: shilendrajadon
2 Replies

5. UNIX for Advanced & Expert Users

Script to search a bad record in a file then put the record in the bad file

I need to write a script that can find a bad record (for example: there is date field colom but value provided in the file for this field is N/A) then script shoud searches this pattern and then insert the whole record into the bad file. Example: File1 Name designation dateOfJoining... (1 Reply)
Discussion started by: shilendrajadon
1 Replies

6. Solaris

help on network communication

Hi, Can anyone suggest a Unix command or c-shell algorithm to simulate to behavior of "wall" command minus the "all users"? What I'm trying to do is to send a notice to just one particular user but i dont want other remotely-logged-on users to receive the message (on the pseudo-terminals). I... (3 Replies)
Discussion started by: Deanne
3 Replies

7. UNIX for Dummies Questions & Answers

chmod 777 security risks?

Hello all, I did a considerable search of the forum and didn't find an answer so I'll ask it here. For clarity's sake I'll state that I know just enough about Unix to be Dangerous (I'm an old Clipper, VO, ASM programmer from the 80's.) I would like to install PHP driven CMS program to my... (6 Replies)
Discussion started by: Gary777
6 Replies
Login or Register to Ask a Question