10 Things That Used to be Good Ideas in Data Security
By Mike Winkler
()
About this ebook
Data security has two objectives and only two: To keep our company’s assets safe from improper users, and to make it available to the proper ones.
We continually make the same human nature mistakes again and again in pursuit of these two deceptively complex objectives. In 10 Things that Used to be Good Ideas in Data Security, author Mike Winkler discusses how we let old ideas, some of which used to be good, keep us from making the right decisions; social inertia meets the pace of unending change. Data sec is a huge puzzle; a puzzle in which the edges keep moving, the shapes of the pieces change, and no matter how good or fast we are, the puzzle will never be finished in time, because it is never finished.
Mike Winkler
An engineer by day, Mike Winkler spends his free time creating new universes, imagining "alternities," and crafting truly original characters. His adventures are large-scale and centered on human relationships, even if the characters are very tall lizard men, immortal warriors, or ultimate weapons at the end of time. When not constructing stories, he's building solar power systems, practicing yoga, chowing down on a hamburger while surrounded by vegetarians, or off playing games with Meg. His writing portfolio includes a variety of fiction and technical works. Mike has been photographed with the likes of fellow author and partner Meg Winkler, various people in costume, and the Rosetta Stone. If he could meet any person, living or dead, he'd travel back in time to meet Winston Churchill on his worst day.
Related to 10 Things That Used to be Good Ideas in Data Security
Related ebooks
Beginning Software Engineering Rating: 5 out of 5 stars5/5Control, Influence, Accept (For Now): Coping with a Future No One Can Predict Rating: 5 out of 5 stars5/5The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production Rating: 0 out of 5 stars0 ratingsNew IT Technology Issues Facing CIOs: How CIOs Can Stay On Top Of The Changes In The Technology That Powers The Company Rating: 0 out of 5 stars0 ratingsIntroduction to Information Systems: Information Technology Essentials, #1 Rating: 0 out of 5 stars0 ratingsFlow: A Handbook for Change-Makers, Mavericks, Innovators and Leaders Rating: 0 out of 5 stars0 ratingsZero Latency Leadership: Driving Equity, Trust, and Sustainability with Emerging Tech Rating: 0 out of 5 stars0 ratingsHow to Work with Your Web Developer: Asking the Right Questions Rating: 0 out of 5 stars0 ratingsThe Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling Rating: 4 out of 5 stars4/5Breaking Banks: The Innovators, Rogues, and Strategists Rebooting Banking Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Program Or Be Programmed: Eleven Commands for the AI Future Rating: 0 out of 5 stars0 ratingsSurviving Life Quick Tips 2.0 Rating: 0 out of 5 stars0 ratingsThe Technology Industry Rating: 0 out of 5 stars0 ratingsProtecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users Rating: 0 out of 5 stars0 ratingsThe Digital Enterprise Rating: 0 out of 5 stars0 ratingsThe Ten Living Principles - The Craft And Creed of Transformative Digital Design Rating: 0 out of 5 stars0 ratingsBig Data: Opportunities and challenges Rating: 0 out of 5 stars0 ratingsDigital Disruption and Transformation: Lessons from History Rating: 0 out of 5 stars0 ratingsThe Art And Science Of Software Development Rating: 0 out of 5 stars0 ratingsPutting Tech in Its Place Rating: 0 out of 5 stars0 ratingsAgile in the New Economy Rating: 0 out of 5 stars0 ratingsSpace, Time, and Cloud: The Emerging Consumer Tech Reality Rating: 0 out of 5 stars0 ratingsOffline: Free Your Mind from Smartphone and Social Media Stress Rating: 3 out of 5 stars3/5The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Rating: 0 out of 5 stars0 ratingsSome Future Day: How AI Is Going to Change Everything Rating: 0 out of 5 stars0 ratingsHacking the Future: Privacy, Identity, and Anonymity on the Web Rating: 3 out of 5 stars3/5Security in a Web 2.0+ World: A Standards-Based Approach Rating: 0 out of 5 stars0 ratingsActivator: Success in the Tech Industry with Design Thinking Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Official (ISC)2 CCSP CBK Reference Rating: 0 out of 5 stars0 ratingsAmazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Kali Linux Intrusion and Exploitation Cookbook Rating: 5 out of 5 stars5/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratings
Reviews for 10 Things That Used to be Good Ideas in Data Security
0 ratings0 reviews
Book preview
10 Things That Used to be Good Ideas in Data Security - Mike Winkler
10 Things That Used to be Good Ideas in Data Security
by Mike Winkler, CISSP
10 Things That Used to be Good Ideas in Data Security
Mike Winkler
Published by Brainy Babe Micro Pub at Smashwords
Smashwords Edition on the next line.
Copyright © 2014 Mike Winkler
Cover Design by Meg Winkler
Cover Image @kraft2727- Fotolia.com
All rights reserved.
Smashwords Edition, License Notes
This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to your favorite ebook retailer and purchase your own copy. Thank you for respecting the hard work of this author.
Foreword
There is a misconception that an informational book or document must be written in a very formal (boring) way. Scores upon scores of technical books line the shelves of bookstores that present authors’ opinions and advice in stanch sentence structure and in a commanding tone. The reader is often instructed about what to do and what not to do in dry fashion, but this is not how things have to be.
The Internet age, bloggers, popular media outlets, and even social media have changed the way that we communicate via the written word. So, while you may be expecting a very formal book, what you hold in your hands is something more along the lines of sharing a conversation with a friend over a good cup of coffee. The author’s suggestions are merely that: suggestions. He offers them to you in order for you to consider them, edit them, and ultimately make them your own.
10 Things that Used to be Good Ideas in Data Security is an invitation to explore other options in data security, in the way that you relate to customers, coworkers, and auditors. This publication is designed to provide accurate and authoritative information in regard to the subject matter, but with the understanding that the publisher and author are not engaged in rendering psychological, financial, legal, or other professional services. I ask that as you read this publication, you use your best judgment regarding its suggestions. I sincerely hope that you find it as enjoyable as I have.
Megan Winkler, MA
Brainy Babe Micro Pub
10 Things That Used to be Good Ideas in Data Security
Who are you talking to here, Mike?
Am I wasting my time if I am not a CISO? Or am I wasting my time if I am?
The answer is no
either way. I know every author of every book claims it is perfect for all readers. Nearly all of them are lying, or at least fluffing a bit to increase sales. Instead of claiming that I have written the universal business book I want to suggest that data security is a puzzle. It would be bad enough if it were just one of those horrible 10,000 piece table-puzzles my uncle used to do. What we have is a puzzle in which the edges keep moving, the shapes of the pieces change, and no matter how good or fast we are, the puzzle will never be finished in time, because it is never finished.
What I hope to bring to you is a guide to your piece of the puzzle. The newest system admin has fresh eyes and can see what the CISO cannot. The Security Director sees how much work things are to manage in a way that the higher ups can’t see. The CISO can (hopefully) see the big picture in order to use it in guiding the company.
In a constantly changing puzzle, we are all trying to achieve two things: 1) keep our company’s assets safe from improper users, and 2) make them available to the proper ones. Those two simple concepts are the job. Many of us often lose sight of this primal fact: data security has those two objectives and only those two. I am aware I am far from the first writer to talk about needing the balance between them. My objective here is to teach a little to each of us, whatever our job function, about how to do this without falling into the pitfalls of old ideas and old techniques.
In the modern world to be an educated IT consumer, you must understand the motives of your suppliers and manufacturers. A lot of what we talk about here is about insight (no pun intended) into what is motivating the vendors. It would be easy if the whole argument were the price wrangling in the finance offices at the end of the deal cycle. The truth is that there is a complex web of forces acting on them (and us) that forms their offerings and alters the way they deal with the buying public. Sun Tzu talked about the value of knowing your enemy. I would never go so far as to say that your vendors and service provider are the enemy, but knowing what drives them will never work against you.
Good communication is hard work; an old boss taught me that, and it took me years to internalize all that it means. The nuances in the case of 10 Things are a bit different. The trusted experts in your environment have very likely gotten myopic on some topics of their expertise: you can depend on that fact in every network of any size. It is a basic human trait to find a comfortable niche in an ever-changing world—it is also what will get you malicious outage or a data loss. Depend on it. If each of us can communicate about our view on the metamorphic (and metaphoric!) puzzle we have, maybe we can do a better job of solving it.
The presented problem should come with a presented solution
This is true with marriage, a company, or a lunch decision. Any time you present a problem you should be prepared to present a solution to the problem you brought, even if this is just brainstorming with the team about what the next set of answers is. For each of the problems presented here in 10 Things, I will present at least one way out of it. Solutions are what we should be looking for every day; otherwise we are just griping. As you will find in the reading of this work, one of my least favorite things in the whole world is the griping that goes on for the sake of griping.
A thought on name dropping, rants, and product recommendations
Anyone looking me up will see I have been on the vendor side of the tech industry for a long time. No vendor or service provider is giving any input (other than their public Web pages) or is compensating me in any way for my words. When I recommend people, they are from my heart and my experience. When I talk about products that solve problems, in no way do I imply that they are the only brand and only solution in that space. If I recommend VMware ACE, I am not saying anything bad about the competing Citrix product, just that I have used the VMware and it performed well.
There are places where I slam products and product philosophies. Poor Microsoft has become a target for this; they are part of what is a growing group of criticism magnets. As is true with my