Due to agencies rarely have deeply layered information security protection, they are limited to a minimum set of protection tools, their infrastructure is not ready to mitigate new threats. This problem remains relevant. With regard to critical information infrastructure facilities, FSTEC has developed a draft of requirements for ensuring information security during remote access. Remote access information security tools will have to be certified for compliance with these requirements. In the near future, the draft will be submitted to the FSTEC Director for approval.
Tales of Security: How the Merchant Kept His Keys
Vladimir Bezmaly | 02/16/2021
A merchant had a misfortune, they were stealing from him. He had already started ordering imported locks from the gnomes, but they were still stealing. He decided to complain to King Eric the Just and came to his court. And he invited the elder of the gnome guild of craftsmen there.
- Your Majesty, I have a problem! I ask you to hold the gnomes accountable for the poor quality of their work. I have ordered locks from them several times, but still, I come and the goods have been stolen. And the locks are intact. I have already called them to look. They say that all the locks were opened with the original keys, that they are responsible for the quality of the locks and keys.
— Is this your first time?
Story one
- No, your majesty, this is his second time. The pakistan mobile database time he ordered three identical locks from us, and two keys for them. He always carried one on his belt.
- And the other one?
- I had another one in a box in my yard. But it was locked.
- Sir Elder, have you looked at the lock on the box?
- Of course! It's a piece of junk, not a lock! Any boy can open it with a nail.
— A question for the merchant. Why did you skimp on a good lock for the box?
- Well, it’s expensive, and there’s a dog there.
- Dog?
Llimited funding, government
-
- Posts: 535
- Joined: Mon Dec 23, 2024 3:13 am