My Blog List

Monday, August 25, 2008

Did Credit Card Issuers Overreact to TJX Data Breach?

The site pogowasright is carrying a post in the Electronic Data Records Law blog by Benjamin Wright, an attorney and "specialist in email compliance and risk management controls and services." I usually tend to offer commentary on stories where a data breach could have been avoided via the use of disk encryption. But, I'd like to cover this latest post by Wright because it seems to me that he's falling for a particular bias, not in the sense of prejudice, but one that is more "clinical" in nature: outcome bias. And many people tend to fall for it, if behavioral psychologists are to be believed (I have yet to find a reason not to believe them). A good definition of outcome bias is found at the Wikipedia site:
"One will often judge a past decision by its ultimate outcome instead of based on the quality of the decision at the time it was made, given what was known at that time. This is an error because no decision maker ever knows whether or not a calculated risk will turn out for the best. The actual outcome of the decision will often be determined by chance, with some risks working out and others not. Individuals whose judgments are influenced by outcome bias are seemingly holding decision makers responsible for events beyond their control." [emphasis mine]
Why do I bring this up? Because Wright's arguments are mostly based on what was found after the entire debacle died down a bit, ending in the culmination of the indictments of eleven people who were associated with the TJX breach. (I should note, however, that because the crime was international in nature, only three are actually under custody. It's not known whether the remaining eight will ever be found. Heck, one of them is known only via his online alias).
$65 Million vs. $1 Million
The main point that Wright makes is that the "the costs incurred to cancel cards far exceeded the true magnitude of the TJX break-in." As evidence, he notes TJX's $65 million settlement with credit card issuers. The actual cost of fraud-although Wright notes that a final accounting is yet to be published-currently stands at tens of thousands of dollars in cash and at least one million dollars in fraudulently bought gift cards.
$65 million vs. $1 million and change-it does look like an overreaction. The $65 million was used to cover the reissue of all the cards that were believed to be compromised at TJX. An additional point that Wright made was that obviously there was no need to have all the cards reissued: look at that 65 to 1 disparity. I agree; while dollars cannot be directly translated into the number of cards affected-obviously charges per card will differ-doesn't it look like only replacing, say, a third of the cards, would've done the trick?
However, Wright can only make this observation because the perpetrators weren't able to make further charges: the old credit cards were voided. If a mass reissue of cards was not done by the credit card companies, who knows how much higher the $1 million plus figure could have climbed?
Granted, these hackers had millions upon millions of cards with them, and had collected them over a period of 18 months, giving them ample time to make some serious damage. But there is no law stating that hackers ought to carry out their illicit activities in a linear fashion: perhaps they were starting out small to see if anyone noticed, and planned on bigger activities further on. We'll never know, because the perps were stopped dead in their tracks. If the cards are void, the criminals can't carry out their fraudulent activities; it's that simple. So, the same action that Wright is criticizing is probably the reason why that figure of fraudulent charges, $1 million and change, stayed so low. Remember, the cards weren't reissued until mid 2007. The criminals were identified and three were arrested just days ago. If cards hadn't been reissued...one year is a long time, and someone could have done some real damage.
Plus, I did find an article at the WSJ where it's stated that the incident could be tied to "$8 million worth of gift cards and used them to buy flat-screen TVs, computers and other electronics across 50 of the state's 67 counties." The above $1 million could be quite an underestimate.
Moral Hazard
Wright also points out that the credit card system is robust, and that "the multiform layers of controls in the system make it very hard and dangerous for criminals to capitalize on data stolen from a merchant." OK, I believe that.
I mean, I've experienced a small part of it. I know my bank will call me once in a while when I make a purchase that seems out of the ordinary. I also know that it costs money to staff these people who call me. I'd imagine that an increase in suspicious activities in the system (thanks to the breach of credit card data) will result in more people having to be staffed in order to call more customers, more often. Who pays these people? Certainly not TJX.
Plus, banks are not hooked up to TSA's database (which is a good thing). I note this because banks don't know whether you're on vacation or not. Let's say that you decide to take a vacation to Tahiti, and flash your credit card to buy coral necklaces for yourself, your friends, and family. Your card gets declined because it's outside your normal activity (which what a vacation technically happens to be). How are these bank representatives going to reach you to confirm the purchase? You're on vacation. (This doesn't have to be relegated to vacations only, by the way. It happens often enough that for some people it's more than an inconvenience.)
By nature, such actions are a double edged sword. When a bank stops a sale because it suspects fraud-and it happens to be fraud-they get praise from the customer; otherwise, if it's a legitimate charge, the bank gets ill will, perhaps a random blog post about the "stupidity" of certain banks. The bank never knows on what end the sword will fall. Why should the bank have to juggle this PR problem when it was a retailer that screwed up?
I don't know what other systems are in place, but I'd imagine it means that the banks would be heavily involved in the process. Why should banks have to take on the ongoing costs of a mistake a merchant made? Especially when said merchant was a) not in compliance with the rules and b) knew it was not in compliance with the rules and decided to keep the system that way? TJX supposedly used a weaker form of encryption to secure their wireless data, knowing it didn't provide adequate protection because they wanted to save money.
Let's remember that no one knew what the end result would have been when the TJX situation was revealed. Not knowing what would happen, the only way to fix the situation would have been to reissue cards, and have TJX pay for it, since it was their fault. Maybe it's a lack of imagination on my part, but pretty much any other solution would have meant that TJX was getting off the hook for actual damages as far as they knew, one year ago. Anything else would have meant letting TJX off the hook, and that may have created a moral hazard industry wide.
The Irony
What I find ironic is that, while TJX didn't understand the value of encryption, the hackers did, twofold: first, when breaking into TJX due to the merchant's weak encryption; and second, when they decided that file encryption was the way to keep safe their ill gotten data.
Tim Maliyil is CEO and founder of Data Guard Systems, Inc., a leading developer and marketer of endpoint managed security services and online business management software, based in New York City. Data Guard Systems is an Application Service Provider (ASP) and offers intuitive business management software to various industries. Data Guard's flagship product is the AlertBoot data security managed service. AlertBoot offers full disk encryption and a comprehensive suite of disk security solutions as a centralized, managed service. Deployment times and support are significantly reduced, thus resulting in a lower overall total cost of ownership for an organization. Prior to founding Data Guard Systems, Mr. Maliyil served as the Director of IT at HarborTech, a privately-held supply chain house for the semiconductor industry. He also held various positions at Netegrity (now Computer Associates). Mr. Maliyil holds a B.S. in Computer Science from Tufts University.

Your Website Can Subscribe You to Spam

If you are anyone else, these days you are almost getting to the point of just not even checking your email anymore. Spam is at an all time high, and to check your email means going through mountains of spam. I've talked to some people getting sick of 20-30 messages a day, but those are just the lucky people. I have also personally witnessed accounts that will download as many as 300-400 a day or even more. The only reason that spammers continue sending out so much junk that you have no desire to download, is that it works. It's sad to admit that, but people actually click those advertisements.
How am I opting-in For spam?
Well that's simple enough in it's on respect. If you have a website, you are probably more than familiar with a desire for Bots such as Google, Yahoo and MSN to visit your site, crawl over all your pages. Hoping that one day they decide to hoist your site up on their shoulders placing your pages on the top of the results. In turn there is always a balance. The Ying to the Yang, for if there is Good, then Evil lurks around the corner.
Spammers use bots as well. All they do is crawl sites, reading them looking for email addresses to add to their databases. Looking for contact forms that can be exploited. Finding email addresses hidden within the code of a website. And then they recoil into the darkness, only to return spewing millions of horrible, unwanted junk messages into everyone's email account. Spammers are horrible individuals, and they will take advantage of you. Look at it this way, would you consider leaving your Social Security card under your car's windshield wipers, just in case someone banged into your car they would know who's car it was? It doesn't matter if even most of the people online are legitimate people like yourself, but it's the 1% of scavengers that always worry me.
What good is my email address if I can't advertise it?
This is a very good question. When I first start talking about how easy someone has made it for spammers to get their email in the first place, this is normally their first response. Here's the thing, you don't have to advertise your email address to allow people to email you. It's your email address if you want to be choosy about the email it receives then start being choosy about how you give it away.
Your Email Address should never be displayed anywhere on your website. It should not be a part of a "mailto:" link for any contact link. It should never be added in a hidden input field on a form. All of these methods guarantee that you will receive lots of spam. The best method of securing your address, but still allowing good email to come through is to use server side scripting.
I know for some that seems like a scary phrase, but to be honest it is not all that scary. All you need to do is find one of hundred's available free scripts available online. There's a form mail perl script that stores your email address in the script, the visitor can never see it, but still sends you email through your contact form. You could also look for a PHP script that stores the email address. ASP is also server side. As long as the script that is not accessible by the visitor stores the email address, then you'll still get the email, but spammers don't.
Good Luck.

How to Get Rid of Spyware Forever - One Crucial Thing You Must Do to Get Rid of Spyware

Let's face it - if you own a computer you probably will get infected with spyware at some point. In fact, industry experts estimate that over 90% of all Internet users will get infected with spyware. But there is one very important thing you can do to get rid of spyware forever, and that is invest in top of the line antispyware software.
I can predict with probably about 95% certainty what happens to most Internet users with regards to getting a spyware infection and then trying to clean it from their computer.
First, more than likely you are not currently running any antispyware software on your computer and if you are, chances are that it is something that you downloaded for free which means that it really isn't that effective anyway so right off the bat you are asking to be infected with spyware.
Next, you're probably one of the majority of people who have downloaded something free off of the internet - be it either music or movies from a sharing network such as Kazaa or Limewire or some type of shareware or freeware software. So not only are you asking to be infected by not running antispyware software, but by downloading freebies off the internet without that protection you have increased the likelihood that you will get infected by spyware by over 300%.
Last, when you do get infected, you'll most likely get on the Internet and try to find some type of free spyware removal tool (if you aren't using one already) which does a really poor job of detecting spyware so you might end up cleaning some of the infected files off of your computer but you will never be completely clean if you are using free antispyware software.
So at this piont, even though you may have cleaned some spyware off of your computer you'll not really be much better off than when you didn't run any software at all. Also, I guarantee that you'll get infected again and over time the amount of spyware that cannot be removed by the free software will continue to grow until it completely takes over your computer.
However, if you are one of those people who are just plain frustrated of having to deal with spyware infections on a regular basis and sick of trying to work on a computer that runs painfully slow, then here is the most crucial thing you can do today that will get rid of your spyware headache forever -
Go right now and spend the measly $30 to get a proven and effective spyware remover that will completely clean your computer of spyware and keep it that way. It is absolutely worth the small investment in software to protect a much bigger investment - your computer.
The only other question you need to have answered now is - what is the absolute best spyware removal tool available?
To find out what the best spyware removal tool is you'll want to visit the Best Spyware Removers For a limited time you can also download a free report entitled- "PC Protection - Keeping Your Computer Clean and Your Identity Safe".

Understanding Computer Terms

More and more businesses and processes around the world are centered round the computer. Anyone that does not know to use computers or the basic computer terms is at disadvantage because most of the happenings in the world are centered round computers. Computer terms are the largest part of the commercial market in any field because every field uses computers and every seller or buyer out to know a bit of computer terms in this world of e-commerce boom.
Computer terms are continuing to grow in popularity; the interest to learn computer terms is fueled by the creation of a lot of information technology based jobs in various destinations and the expansion of existing computer operations. A computer is becoming very much characterized by the offering of the demands of the e-banking system. Online banking operations either for an individual or a corporate office requires some kind of understanding of computer terms for the end user to be able to request transfer or withdraw money. Most of the e-banking methods are becoming worldwide and it is impossible to have all verifications done in person. So, various banking systems are being integrated online to have individual identities verified. From basic operation to log in through verifying identity it is important to understand the computer terms.
Computer terms and their definitions are often included in the help section of any dealing; however, most people do not realize it and they become impatient when they cannot understand some computer terms. In such cases an easy reference idea would be an online computer terms dictionary, where one can use the spelling of the work and log in to the section of the initial alphabet and type in the term there and they get the meaning in just a click.
Getting to know computer terms and online handling of data represents an opportunity for tribal self-reliance and it reduces the dependability on other offline information resources because almost all the how to information is available online. By understanding computer terms one can not only get to know to use the computers better, but they can get access and understanding about a lot of other fields other than computers, when they get to use the computer.
In any field there is going to be a +10 percent growth chance for someone that is versed in computer terms other than being in expert in their own field. Get the help of an online computer dictionary for help on any kind of computer terms that you might need.

Innovation and IT Sector

In the IT sector change seems to be the only constant.
Information technology can be said to include the following:
• A computer network with a software to communicate
• All attachments/ peripherals connected to it
• All audio-video tools and the labor to operate the
• All expenses incurred on developing, operating and maintaining the software
To better understand the idea of IT, consider a few examples:
• Simple computer programs to store, access, and process data
• Your very own PC and its software
• The telephone and the radio buttons utilized in sonic data communications
• Network's sever programs used for electronic mails, database, storage and other host services.
Information technology can thus be defined as that field of engineering which is related with, transmission, storage and retrieval of information through computers and telecommunications.
"Innovation" can be defined just as "something new". There are really no criteria of "how new" that something needs to be. But yes, it needs to be an improvement over what it was before. It is for this reason that, innovation can be defined in different ways to different people. The topic of Innovation is of prime import in the study of technology and engineering. Ergo, for defining innovation for a specific client, it becomes imperative to understand the client's need/inspiration behind seeking the innovation. With the highly sophisticated communications technologies present and emerging by the day, it is becoming rather difficult to distinguish a system as belonging entirely to one specific program. Organizations are seemingly going that extra mile to consolidate their information requirements into one integrated information cosmos.
Smart consultants know well that no one knows the trades better than those who stay in it daily, and, consequently, assume more of a key role in assisting a firm unite its internal and market knowledge with the expertness it has, to bring to the client. They strive to explore the milieu, culture, ethics and of course the politics of the setup, and determine the tolerance standard of the organization for the anticipated change. This demands transparency and that might be hard to attain, but indispensable to success. In the absence of the such information as to where an organization stands right now, and where it has come from, it is improbable to pave the path for the future without being established as the hackneyed, omniscient, pliant consultant ready to sort out everyone's problems without having an iota of hint about the actual workings of the hiring firm.
It is only after that one has done this homework, that one can discuss "innovation" in a manner that isn't empty and self-evident; and that doesn't mix the consultant's idea of innovation with that of the hiring firm. When executives don't rightly understand this innovation process, they fail to appreciate the manifold advantages a simple innovation can generate. Being thus uncertain, they fail to recognize the returns on its investments in the new concepts.
The world leaders of tomorrow will figure from among the companies that today best manage the innovation process. Innovation can be a double-edged sword; for the more the things change, the more they remain the same...

IPv6 (Cisco) Training - Using the "Area Virtual-link" Command

Now, remembering from your CCNA or early networking days; you learned that in an OSPF network, all additional OSPF areas must be connected to the "backbone" area or (Area 0).
But, what if one of those areas lost its connection to the "backbone" area (Area 0); how could you quickly repair the lost connection?
The "area virtual-link" command is a Cisco IOS command that can be used in either "Router Address Family Topology" or "Router" configuration mode; network administrators (like you) use the command to create a "virtual link" that can be used to repair a lost connection to the "backbone" area (Area 0).
Here's an example of a Cisco router in "Router Address Family Topology" configuration mode. (Use this mode if you plan on configuring the Multi-Topology Routing (MTR) feature)
Example: Router(config-router-af-topology)#
And, here's an example of a Cisco router in "Router" configuration mode.
Example: Router(config-router)#
Below is the "area virtual-link" command's proper syntax:
area transit-area-id virtual-link transit-router-id [hello-interval seconds] [retransmit-interval seconds] [transmit-delay seconds] [dead-interval seconds]
Notice, that the command requires a transit "router ID" rather than an IPv6 prefix; the "router ID" is the "router ID" of the remote router.
Here are the default intervals when using the "area virtual-link" command:
hello-interval seconds: 10 seconds
retransmit-interval seconds: 5 seconds
transmit-delay seconds: 1 second
dead-interval seconds: 40 seconds
Having a smaller "hello interval" value, means faster topological changes will be detected, but, you'll have more routing traffic.
Now if you need to reconfigure the "retransmit-interval" value be conservative; if not unwanted retransmissions will occur. Also, remember its recommend to increase the value of this interval when using serial lines and virtual links.
And when thinking about adjusting the "transmit-delay" value, make sure you take into consideration the transmission and propagation delays of the interface.
Now, once the virtual link has been configured on a router, you can use the word "no" in front of the "area virtual-link" command to remove the link or you can use the command "no area area-id" which will remove all area options.
The "area virtual-link" command Keywords and Arguments Explained
area-id-- This argument is an identifier of the area assigned to the transit area for the virtual link. This can be either a decimal value or a valid IPv6 prefix. There is no default.
router-id-- This argument is the "router ID" associated with the virtual link neighbor. The router ID appears in the show ipv6 ospf display. There is no default.
hello-interval seconds- This optional keyword represents time (in seconds) between the hello packets that the Cisco IOS software sends on an interface. The hello interval is an unsigned integer value to be advertised in the hello packets. The value must be the same for all routers and access servers attached to a common network. The default is 10 seconds.
retransmit-interval seconds-- This optional keyword represents time (in seconds) between link-state advertisement (LSA) retransmissions for adjacencies belonging to the interface. The retransmit interval is the expected round-trip delay between any two routers on the attached network. The value must be greater than the expected round-trip delay. The default is 5 seconds.
transmit-delay seconds- This optional keyword represents the estimated time (in seconds) required to send a link-state update packet on the interface. The integer value that must be greater than zero. LSAs in the update packet have their age incremented by this amount before transmission. The default value is 1 second.
dead-interval seconds--This optional keyword represents time (in seconds) that hello packets are not seen before a neighbor declares the router down. The dead interval is an unsigned integer value. The default is four times the hello interval, or 40 seconds. As with the hello interval, this value must be the same for all routers and access servers attached to a common network.
I hope this article was very informative and helped you quickly understand the usage, keywords, and arguments of the "area virtual-link" command. If you need to learn more about the command; I suggest you visit my website, were you'll find the latest information regarding Cisco IPv6 Design and Implementation Techniques.
To your success,