Information Technology Reference
In-Depth Information
receiving the contradictory order. Also note how exe-
cution is kept separate, and given higher priority, from
the task of informing all parties concerned.
According to Navy Regulations At 0815:
If an officer contradicts the orders issued to another by
a superior, the officer who issues the contradictory
orders must immediately report that fact, preferably, in
writing, to the superior whose orders have been con-
travened.
If an officer receives a contradictory order, he or she
must immediately exhibit his or her orders, unless oth-
erwise instructed, and represent the facts in writing to
the officer who has given the last order. If that officer
insists upon the execution of his or her order, it must
be obeyed and the circumstances should be reported
to the office issuing the original order.
—From The Naval Officer's Guide
Summary
It is time to pay more attention to the security aspects of deliverables,
making it perhaps as important as functionality and performance. A good
security system covers business, technical, human, and process factors
related to the systems being implemented. While recognizing the argument
about the “weaker link,” the problem still exists as to how to identify the
weaker links.
Cost is involved in making applications and environments secure. This
cost must be borne by those for whom security has utmost value. It is
quite important to ensure that the right entities are being protected,
remembering that what is important to you may not be important to the
criminal. Security costs must be balanced with business needs.
Human factors continue to present vulnerabilities for software in pro-
duction. Software development and support is a very person-oriented
enterprise, and the culture within software companies and IT departments
has not given due importance to security.
 
Search WWH ::




Custom Search