*Magnify*
    July    
2020
SMTWTFS
   
1
2
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Archive RSS
SPONSORED LINKS
Printed from https://www.writing.com/main/profile/blog/trebor/day/7-31-2020
Rated: 18+ · Book · Writing · #1677545
"Putting on the Game Face"
My Blog Sig

This blog is a doorway into the mind of Percy Goodfellow. Don't be shocked at the lost boys of Namby-Pamby Land and the women they cavort with. Watch as his caricatures blunder about the space between audacious hope and the wake-up calls of tomorrow. Behold their scrawl on the CRT, like graffitti on a subway wall. Examine it through your own lens...Step up my friends, and separate the pepper from the rat poop. Welcome to my abode...the armpit of yesterday, the blinking of an eye and a plank to the edge of Eternity.

Note: This blog is my journal. I've no interest in persuading anyone to adopt my views. What I write is whatever happens to interest me when I start pounding the keys.

July 31, 2020 at 11:04am
July 31, 2020 at 11:04am
#989586
I find it hard to believe that sensitive research facilities are getting hacked. There is a simple way to prevent this from happening. In a nutshell it involves a facility with an upstairs operating space and a basement with the SECURE server. The basement is not hooked to the internet.

Each day a worker takes an elevator to the basement and picks up a working (floppy) disc of the compartmented project he is working on. The disc has only that information needed for the day's work. The upstairs computer can (if necessary) be connected to the internet with all the attendant state of the art security software that is available. Then again it may not, the point being that the working disc is separated from the source data base in the basement. At the end of the workday the disc is returned to the basement. There is no storage of the data allowed upstairs overnight.

In the basement is the secure server which has no connectivity to the internet. This server takes the work done upstairs and updates the mainframe. The floppy that can be taken upstairs, has a limited capacity for data. A supervisor at the basement level oversees the limited information the worker can take upstairs. The worker can only access source data related to their project and only in a quantity needed for daily tasks.

What this does is very simple. A hacker has no access to the unconnected data stored in the basement. Neither do they have access to the working data on the first floor because there is no data storage allowed at the upper level. Thus a hacker would have to break through the fire wall of the upper level, as the work was taking place, or find nothing on the drives to hack into assuming that they were successful at penetrating the first line of defense.

Information to update the basement servers with other regional and national servers across the country would be provided by a human courier service with a route that insured daily updates. One could probably get away with UPS, FEDEX or the US Postal Service for the deliveries. The information on the update parcels would have little meaning in their limited context.

If the Government is serious about security, this type of design renders hacking impossible.



© Copyright 2021 percy goodfellow (UN: trebor at Writing.Com). All rights reserved.
percy goodfellow has granted Writing.Com, its affiliates and its syndicates non-exclusive rights to display this work.

Printed from https://www.writing.com/main/profile/blog/trebor/day/7-31-2020