{"id":314,"date":"2013-09-17T10:34:56","date_gmt":"2013-09-17T14:04:56","guid":{"rendered":"http:\/\/blog.pelleys.com\/?p=314"},"modified":"2013-09-17T10:34:56","modified_gmt":"2013-09-17T14:04:56","slug":"solutions-development-think-about-what-you-are-doing","status":"publish","type":"post","link":"https:\/\/blog.pelleys.com\/?p=314","title":{"rendered":"Solutions Development &#8211; Think about what you are doing&#8230;"},"content":{"rendered":"<p>I was reading today an article on <a href=\"http:\/\/www.zdnet.com\/\" target=\"_blank\">ZDNet<\/a> about how the state of how<em> <a href=\"http:\/\/www.zdnet.com\/maryland-state-security-sloppiness-exposes-personal-data-7000020752\/\" target=\"_blank\">Maryland state security sloppiness exposes personal data<\/a><\/em>. The article by <a href=\"http:\/\/www.zdnet.com\/meet-the-team\/us\/larry-seltzer\/\" target=\"_blank\">Larry Selzer\u00a0<\/a>shows how, to quote him:<\/p>\n<blockquote><p>&#8220;Mustering all necessary resources&#8221; in this case means &#8220;cutting corners.&#8221;<\/p><\/blockquote>\n<p>This shows the dangers of lack of resources &#8211; time, expertise, money &#8211; that can point you in the direction of danger if you are not careful. One would think that if you are collecting drivers&#8217; license numbers, social security numbers, addresses and other personally identifiable information you would carefully think about the implications of\u00a0<em>not<\/em> having the information secure.<\/p>\n<p>At first I was thinking that &#8211; hopefully &#8211; someone writing the solution was security-minded enough to raise the risk to management but then I realized that if this was indeed the case the problem is actually much worse: Either senior people did not recognize the issue or, worse yet again, they did not care about it. (I always think about these issues as &#8220;ignorance versus incompetence&#8221;.) Hopefully, there will be more digging into the issue to find out where the problem actually exists. Being an IT professional with security being one of my hats I find this troubling&#8230;<\/p>\n<p>Here is a screen capture &#8211; the site is no longer publicly-accessible, thankfully, from <a href=\"http:\/\/cdn-static.zdnet.com\/i\/r\/story\/70\/00\/020752\/maryland-state-data-leakage-v2-620x350.jpg?hash=L2HmLJIyMT&amp;upscale=1\" target=\"_blank\">ZDNet<\/a>:<\/p>\n<div style=\"width: 630px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/cdn-static.zdnet.com\/i\/r\/story\/70\/00\/020752\/maryland-state-data-leakage-v2-620x350.jpg?hash=L2HmLJIyMT&amp;upscale=1\" width=\"620\" height=\"350\" \/><p class=\"wp-caption-text\">Screen capture of log of HTTP traffic from State of Maryland&#8217;s gun permit application site<\/p><\/div>\n<p><span id=\"BOSSKNB12_V2_SPECIAL_NODE\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was reading today an article on ZDNet about how the state of how Maryland state security sloppiness exposes personal data. The article by Larry Selzer\u00a0shows how, to quote him: &#8220;Mustering all necessary resources&#8221; in this case means &#8220;cutting corners.&#8221; &hellip; <a href=\"https:\/\/blog.pelleys.com\/?p=314\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-314","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.pelleys.com\/index.php?rest_route=\/wp\/v2\/posts\/314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.pelleys.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.pelleys.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.pelleys.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.pelleys.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=314"}],"version-history":[{"count":0,"href":"https:\/\/blog.pelleys.com\/index.php?rest_route=\/wp\/v2\/posts\/314\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.pelleys.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.pelleys.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.pelleys.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}