Monthly Archives: December 2013

WoW is probably where they need to be looking…

Online Gaming

I was a bit dumb on the online gaming part.  It has been a while since I played WoW (2004) and I was thinking as a scout leader where we do everything with two adults including e-mails.

Here are some interesting articles I have dug up on this subject and it get worse.

http://www.dfinews.com/articles/2010/05/multiplayer-game-forensics#.Uq4-6JG6z98

http://gamepolitics.com/2011/11/03/teen-murderer-confess-crime-world-warcraft-chat#.Uq4-8pG6z98

http://exforensis.blogspot.com/2010/05/multiplayer-game-forensics-ceic-2010.html

http://socialtimes.com/sociologists-measure-social-behavior-and-psychology-in-world-of-warcraft_b12433

So it looks like we need online police and they need to be watching.

 

To fel with you! There’s an NSA spook in my World of Warcraft • The Register

To fel with you! There’s an NSA spook in my World of Warcraft • The Register.

Okay most programs now have the ability to leave a message to convey a message.  Should adult agents be pretending to be children to “talk” on game message boards.  No I think they have crossed the line.  Gathering information from a database or a tap is one thing but interaction with children is a big no no.  Who is watching them?  I am not cool with this.

The 5 Causes of IAM Failure | FishNet Security

The 5 Causes of IAM Failure | FishNet Security.

My experience with IAM failure is from unrealistic expectations.  Where original suggested design is too far from implemented design leading to unhappy customers and preventable outages.  The cost on implement project plus outages and further implementations exceed early design by a wide margin.  The get is in and we will fix it mentality vs lets look at end state build our roadmap to that.

Talking Data Security and Compliance » Security is a Business Imperative, Not an IT Task

Talking Data Security and Compliance » Security is a Business Imperative, Not an IT Task.

We cannot just bolt it an.  It is a new way of thinking.  For example, there is a generation of us that hold doors open for people.  This thinking leads to “tailgating” thru a security point.  A whole new way of thinking has to be adopted to prevent this.  Everything else from having issues with a common system and asking to borrow a user-id and password to “just get it done”.  Change is hard.  Breaking bad habits when they are not thought of as bad or a security issue is going to be harder.  BYOD should be very fun for classification of data and the issues it bring with that policy.