Subject: | |
From: | |
Reply To: | Johnson, Tracy |
Date: | Wed, 17 Jan 2001 11:20:26 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Of course Mr. Cook is correct regarding codebreaking.
A consideration in encrypted transmission over open
circuits is the life-span as well as the sensitivity
of the data.
If your potential adversary can crack you document
in 20 minutes, but your data only has a life span
of 10 minutes then your data is relatively secure
(until the enemy learns to crack your document
in 9 minutes.)
If your data is non-sensitive, then your data is
secure (simply because nobody gives a rats-ass.)
(This doesn't deny however, meaningful and harmful
data can be derived from the accumulation of
mounds of non-sensitive data. Neither does it
deny that potential adversaries attempt to collect
all forms of data from a particular source,
sensitive or non-sensitive for analysis.)
For certain most HPe3000 sites are in the business
world.
Say for example you had a 'milk-factory' in the
Sudan and you were using MANMAN Repetitive. Would
the "Bill-of-Material" (BOM) ;-) be sensitive to
your company? Probably yes. Would the lead time
for delivery of parts from vendors be sensitive?
Probably yes. Percentage of scrap, safety-stock?
Maybe. Who the vendor is? Definitely yes. Who
are your customers? Yes. Etc.
Tracy Johnson
MSI Schaevitz Sensors
|
|
|