:: MIS Insights ::

by Fernando C Mendizabal Jr

The Authentication of the Ring

Filed under: Security — Pipboy at 10:56 pm on Tuesday, September 12, 2006

Once upon a time, there were ten employees in a big, bhg, bpg company. These ten employees, hailing from the same department, decided to go out for a noontime feast one day. Among the ten brave souls that dared to eat outside the department premises, five of them brought their magic identification cards. The rest didn’t.


HID prox cards

Now these magic identification cards were bestowed upon them by the all-powerful Human Resources department to empower them during their quests - most of which had a minimum 2.5 year fellowship bond. Legend has it that if the magic cards were placed near the correct scanners, doors that led to untold treasures would open for them.

Love ko to!

10 value meals and 1 hour later, the ten employees went back to the company to resume their quests. The first five with identification cards easily got in. With a 180-degree, crescent-shaped swiping motion of their magic identification cards over the department door’s scanner, the door unlocked with a loud “bzzzt!”

HID reader

Then there was the other half that didn’t bring their magic card. They thought that, “Hey, fellow adventurers, you can let us in when you get in right?”

Well, the five cardless dolts were wrong. Their fellow prudent adventurers didn’t let them hitch a ride back inside to the department. They knew that the magic identification cards were there for a reason - to prevent, or at least minimize, unauthorized entry. One cannot even begin to imagine the horrors that would be unleashed if a cracker got inside to mess with the systems or if an intelligence spy got access to the company’s treasured information chest. Such careless behavior should not be tolerated. After all, who better can implement the company’s security program, other than the employees themselves?

The five boy/girl scouts wanted to teach the five rascals a lesson. However, the guard waiting at the lobby proved to be the weak link in the company’s security plan. With a persuasion spell of Pleasus Openus the Doorus Maximus, the guard promptly used his magic card to let the employees in to the department.

End of Story.

Truly, companies could do more with their security measures. This is an example of a security breach that used social engineering (guard) to thwart two of the pillars of IT security - authentication and authorization. In my honest opinion, either companies start implementing what they have on paper or scrap the whole program all together. With roughly US$3 per magic card and a hefty US$1,000 per scanner, the money could have been put to better use for the sake of the stockholders.

2 Comments »

336

Comment by wowenkho

September 13, 2006 @ 11:10 am

sobra naman yatang extreme yung example na alam mong coworkers sila tapos di mo pa rin papapasukin kasi nalimot nila yung cards nila. in essence, naman din you’re not allowing unauthorized entry kasi employees sila ng company and they, supposedly, can be trusted.

mahirap kasi kung pure technological requirement/purpose ang tinitignan ng tao, kaya parang paminsan nagiging pilosopo and strict na kahit paminsan hindi naman dapat.

if you think of the essence of why the cards are there, you’d comprehend that you’re trying to minimize or prevent unauthorized entry nga. pero you’d also understand naman din na you’d allow your actual coworkers to get in coz they are coworkers. T_T… edi kung iniwan niyo sila sa labas kasi di nila nadala yung cards, edi di na rin sila nakapagwork. hahaha.

338

Comment by Pipboy

September 13, 2006 @ 9:13 pm

Of course, it was extreme. :D

It was meant to be a hyperbole to emphasize what happens when a western style corporation employs asian culture. the rigidness of corporate governance meets the relaxed eastern atmosphere.

Management might not be happy to hear this in their security audits. This goes in the same way that some Asians aren’t actually happy wearing long sleeves and pants in such tropical country.

Ideally, it will be a yes-or-no situation. However, in the Philippines, it’s more of a let’s compromise situation - and in such compromising events, security is always the first casualty.

RSS feed for comments on this post. TrackBack URI

Leave a comment

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>

 

Bad Behavior has blocked 3 access attempts in the last 7 days.