Episode II: Creating security regualtions

Take a lighter look at the security world and enjoy the adventures of noblepersons (security gurus) defending their kingdoms (company networks) from evildoers (crackers). This ongoing column offers a whimsical view of what the dynamics of information security might have looked like in medieval times.

In our last episode, the Kingdom's network and system administrators were slaying fire-breathing worms (and whatnot) whilst fraught with trepidation over informing His Majesty that Impervious was losing some of its "im."

Overtime rates and lost productivity went unnoticed by the King. If he were to learn of chinks in Impervious' armor and a need to purchase new tools, appliances, and/or outside services, it would surely draw his ire. This was especially so since he dumped all that denarii into a PRM (peasant relationship management) project.

For the time being, an eminence front was decided upon and the administrators continued to hold out their shields and wield their swift swords. Deaf, dumb and blind ... they could still play a mean pinball.

Speaking of eminence, back at the castle, the King was holding court with His Eminence, Regulatius, the Empire's local Prefect. Regulatius bore edicts from the highest of high.

You see, Impervious was not the only kingdom in the empire to suffer the treachery of the invaders. Reconnoiterers donning black berets had been spotted in Hermetica and Never Never Land as well. There was no challenge to be had at Frankish

    Requires Free Membership to View

Gaul, so they left it alone.

Unraveling the scrolls, the Prefect's pontifications poured out powerfully:

"You will practice due care and due diligence!" "The privacy of your subjects will be protected!" "Thou shalt be certified and accredited!" "With availability, integrity and confidentiality for all!" "Noncompliance will result in fines, the rack or both!" "By the way, King of Impervious, where are your clothes?"

As the King bade good day to Regulatius, he summoned his administrators, his scribe and his tailor.

About the author
Bill Kirkendale, CISSP, has been an IT professional for fourteen years and is a former United States Marine.

Next episode: His Majesty issues a new decree and gets a new robe

This was first published in March 2004

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.