Category Archives: Security

PCI DSS Scoping

The Security Standards Council (SSC) of PCI reminded us today that a scope statement still requires validation. A scope should be reduced only after a thorough assessment of controls.

Secure treatment of data (e.g. hashing) could reduce the number of systems that are kept within scope but this needs to be assessed and verified. Another example is an entity that claims it has no wireless. This claim must be tested and they must have a regular process and control capability (wireless scanner) to manage risk going forward. Assessors will look for supporting documentation before they can allow scope to change. When scope is done properly it generates confidence on exactly where to look based on tests and evidence.

This is not to say that it is easy. A major retail executive once told me his company had no need for antivirus on their point of sale devices. Why? He believed his systems had no viruses, therefore he saw no need for antivirus. I had to convince him that he should be taking the opposite approach. Use of antivirus would confirm the lack of viruses. An absence of empirical data, let alone awareness of helpdesk and incident reports, did not register with this executive. This is a fine case of why risk is something that can not always be left to intuition alone or to market forces. Many actors operate with trust or hope rather than a complete or reasonable data set. A month after installing antivirus the executive was extremely thankful — he soon found a clear path to reduce point of sale outages and thus his operating costs were significantly reduced.

The steps to take after hearing “no” and “out of scope” are illustrated nicely in the SSC Wireless Guidelines decision tree:

Skimming Prevention

The PCI SSC just released a document on how to detect and prevent skimming.

Skimming, as the word implies, is capturing data as it passes through a device. That means devices are usually modified so they will copy and record data to unauthorized storage or they will send it out over an unauthorized network connection.

The guide includes many images of skimming devices as well as an easy risk assessment form to help outline potential areas of vulnerability such as physical location, hours of operation, personnel and technology. In a nutshell the advice is the usual “watch for anything suspicious”. This means anything that accepts cards should have a known safe appearance (wires, stickers) as well as a clean/safe space around it. Staff should be trained such that any changes to the appearance or items introduced into the safe space should raise suspicion and be reported.

If you see Tetris running on Chip and PIN terminal, for example, you should not assume all is well with security.

Criminals will try anything to get access to the card data. Have you seen those charity boxes that often sit on a counter near a register? These have been known to be used to place hidden cameras next to a device to record PIN information. Here is another example from the guide:

Hazardous Effects of Gaming

All things in moderation could be the byline of this story. Computerworld brings to light a CDC study that apparently says gamers are 35, overweight and sad

The average gamer, far from being a teen, is actually a 35-year-old man who is overweight, aggressive, introverted — and often depressed, according to a report out this week from the Centers for Disease Control and Prevention (CDC)

The study correlates gaming with indoor inactivity, which then correlates to health problems and loneliness. This hardly seems to be a direct causation argument. Perhaps that is why the CDC is not issuing a statement that games cause obesity and depression.

I noted that the data is derived from an online survey of fewer than 600 people in Seattle, Washington between the ages of 19-90. Is someone in the target group most likely to buy a game, especially if they live in a cold and rainy climate, or can we blame gaming for them becoming the target group? Must be tricky to make conclusions about teens when the majority (13-18) aren’t even in the survey (probably to avoid the complication of surveying minors).

The study notes that half of gamers are between 18 and 49 years old, while 25% are 50 and older. The CDC also pointed out that of online gamers aged 8 to 34, nearly 12% showed multiple signs of addiction.

The percentage might go up if more teens were allowed to answer the survey. On top of suspicious data collection gaps, it also seems some are quick to expand the study findings to anything related to a computer.

Jim McGregor, an analyst at In-Stat, noted that his concern isn’t just with gaming but with social networks, as well.

“My issue is that it’s not just gaming. It’s social networking. It’s the Web in general,” said McGregor. “We’ve gained so much, but still it puts people in front of a computer screen for hours on end. It gives Americans just another reason to be fat, dumb and lazy.”

Harsh words considering a causal connection is missing. It’s the web. It’s social networking. It’s information. Clearly, as found in this study of a small group in Seattle, filling your head with facts and data and sitting around and working at a desk is the route to being dumb and lazy. Save yourself now. Why are you still reading this? Go away (not to Seattle) and run on a treadmill until you’re smart and happy.

In an apparent contradiction to the above survey results, Computerworld also wants you to know that men aged 25-49 are the group most likely to be found in cafes with their computer. They don’t just sit at home anymore.

The survey also found that 67% of cafe Wi-Fi users were 25-49, 74% were male and 66% had a household income of $50,000 or more. About 44% of the cafe users reported working for small companies of fewer than 99 workers, indicating the value of a Wi-Fi-enabled cafe as a kind of nomadic office.

This all suggests that surveys of groups using computers will find a majority of them are middle-aged men with a steady income. Some of them stay at home, some go out. Some are happy, some sad, some overweight, some fit. This does not suggest to me that using a computer will make you a middle-aged man with a steady-income, or that the flow of information that comes from a computer causes depression and obesity…

Clean Diesel Locomotives

California was awarded millions this summer for new Clean Diesel Projects

The US Environmental Protection Agency (EPA) announced today that it has awarded $25 million for clean diesel projects in California under the American Reinvestment and Recovery Act (ARRA) of 2009 National Clean Diesel Funding Assistance Program

A single clean-burning diesel locomotive engine can cost $1.6 million, so companies like California Northern Railroad (CFNR) have been encouraged to upgrade by federal and state financial incentives. 80 percent of the cost of the new CFNR 501 engine came fom the Carl Moyer Memorial Air Quality Standards Attainment Program at the Bay Area Air Quality Management District. Likewise, Caltrans is upgrading their fleet.

The first Caltrans locomotive to be upgraded is a Model F59PHI originally built by Electro-Motive Diesel in October 2001. EMD has installed a 710ECO™ Repower upgrade package with the latest microprocessor-controlled locomotive engine technology for lower emissions, increased fuel economy, greater reliability and predictable maintenance costs. The newly upgraded locomotive will now achieve EPA Tier 2 emissions performance – two levels cleaner than required for this model.

Thus it has taken state laws, local and national grants, as well as 40% more fuel efficiency, and concern about health quality (85% particulate matter reduction in the new engines) to get the railroads to finally get moving in this direction.