Why one should be "concerned", but not "paranoid" about I.T security in the age of "big data"!

Introduction



I am back writing again this week, after a rather abbreviated entry last weekend, surrounding a couple of albums from the 1980's I was listening to, that sounded as though they were twenty-years ahead of their time. This week, I will be talking about the "Psychology of security" if you will and the "paranoia" surrounding it!. It should be dully noted, that this weeks entry was inspired by a rather "elegant rant", but some poster on "Slashdot" a couple of days ago, that was being blown out proportion (you can look up the post yourself on their if you would like, I won't be referencing here, because I consider it be "nonsensical" in some regard). Let's start by separating "fact" from "fiction". Afterwards, we will continue to work our way into conclusion about "news" sites on the Internet, from there on out.

"Fact" vs. "Fiction" and some underlying "assumptions" about the N.S.A



The general "fact" of the matter is, everyone SHOULD always keep I.T Security in the back of their mind, when they are designing and customizing systems from the ground up. This includes everything, like system, network, physical, and information security. The "fiction" part comes in, when you believe you are going to GUARANTEED 100% security. You should not concern yourself with this, unless your name is "Bruce Schneier", who is the world's leading public cryptographer and author of both "Blowfish" and "Twofish" ciphers or you are working for the N.S.A! Why do I single out the N.S.A? I do this for a number of reasons, the first and foremost being they have their own CUSTOM designed Operating Systems (it's "speculated" they use over eight) and they use their own line of customized Suite B cryptography algorithms (that are also classified and not available to the public). The point of all this? 100% Security is NEVER going to be reality for public consumption. All you can do, is work with what "tools" are given to you. Most of the security "technologies" we take for granted, in this day and age, where either invented or recommended by the N.S.A. Some technologies in that category, include creation of Security-Enhanced Linux (SELinux) in the mid 90's and the recommendation in 2001 for Rijndael or "AES" to be the successor to 3DES cipher for data encryption! Any notion that any type of new security technology has "back doors" in it is, simply "paranoid delusional" thinking and probably warrants a trip to the Psychologist. This is "conjured" up by individuals, who fail to understand how this technology actually "works" or reading too many "news" websites on the Internet, which feeds into that paranoia. This and the fact that their claims always fail to be "verified" by third-parties. Either way you should ignore the "mind games" and get to what's important, when implementing security in your I.T infrastructure, instead focusing on NIST recommendations. Remember the old saying "the best offense, is a good defense".

Conclusion



In conclusion, we can see that the I.T Security industry is full of a lot of people who are generally concerned with implementing secure infrastructures and want to teach people the best possible way of securing there own, henceforth discussions at the R.S.A conference and from evangelists like the Boston based security company Rapid7. In the same token, we also may come to the realization that is ALSO filled with "snake-oil salesman", whose goal is capture the "human imagination", conjure up lies, and spread fear mongering B.S on "news" sites in an effort to make more money! This I would argue, is the part of the industry that leaves a generally dissatisfaction and distrust in people's mouths! One should always be cautious and proceed with care, when designing their own I.T security infrastructure and remember to never read into the "hype". That's all for this weeks entry. I will be back in a couple of days or next week with a new entry. I hope this entry has helped people to thread cautiously and be skeptical, regarding whatever they are read on "news" sites and understand that fear sells! Good luck and godspeed. See you next week! ;-D

Comments

Popular posts from this blog

Encoding Opus files in Linux with opusenc for your own collection and HTML 5

Encoding Vorbis files in Linux using oggenc for your own music collection and HTML 5

Transcoding H.264 files to Google's WebM format (VP8/Vorbis) in FFMPEG 0.6 or better using Linux for your own collection and HTML 5