HP3000-L Archives

January 2001, Week 3

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Johnson, Tracy" <[log in to unmask]>
Reply To:
Johnson, Tracy
Date:
Wed, 17 Jan 2001 11:20:26 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (36 lines)
Of course Mr. Cook is correct regarding codebreaking.

A consideration in encrypted transmission over open
circuits is the life-span as well as the sensitivity
of the data.

If your potential adversary can crack you document
in 20 minutes, but your data only has a life span
of 10 minutes then your data is relatively secure
(until the enemy learns to crack your document
in 9 minutes.)

If your data is non-sensitive, then your data is
secure (simply because nobody gives a rats-ass.)
(This doesn't deny however, meaningful and harmful
data can be derived from the accumulation of
mounds of non-sensitive data.  Neither does it
deny that potential adversaries attempt to collect
all forms of data from a particular source,
sensitive or non-sensitive for analysis.)

For certain most HPe3000 sites are in the business
world.

Say for example you had a 'milk-factory' in the
Sudan and you were using MANMAN Repetitive.  Would
the "Bill-of-Material" (BOM) ;-) be sensitive to
your company?  Probably yes.  Would the lead time
for delivery of parts from vendors be sensitive?
Probably yes.  Percentage of scrap, safety-stock?
Maybe.  Who the vendor is?  Definitely yes.  Who
are your customers?  Yes.  Etc.

Tracy Johnson
MSI Schaevitz Sensors

ATOM RSS1 RSS2