Recommendations for books on Leadership

The last couple University courses in the graduate program have been focused on various aspects of leadership.  Over the years, I have read a lot of different books on leadership, all with their own perspective.

Some are written to help direct as a leader in the home (a father for me specifically), some for leadership in the Church, some as practical guides for leadership in general society, and others specifically geared towards leadership in professional organizations.

Each and every one one of these books has had a positive impact on me, and has helped me mature in my style of leadership and understanding.  As a result, I thought I would share some of the books near the top of my list.

[pageview url=”http://rcm.amazon.com/e/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=logiodicecom-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=0743269519″ height=”240px”]

 

[pageview url=”http://rcm.amazon.com/e/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=logiodicecom-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=0842306803″  height=”240px”]

 

[pageview url=”http://rcm.amazon.com/e/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=logiodicecom-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=0849946379″  height=”240px”]

 

[pageview url=”http://rcm.amazon.com/e/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=logiodicecom-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=143350278X”  height=”240px”]

 

[pageview url=”http://rcm.amazon.com/e/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=logiodicecom-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=0787960756″  height=”240px”]

 

[pageview url=”http://rcm.amazon.com/e/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=logiodicecom-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=159995365X” height=”240px”]

 

[pageview url=”http://rcm.amazon.com/e/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=logiodicecom-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=1452203407″ height=”240px”]

 

[pageview url=”http://rcm.amazon.com/e/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=logiodicecom-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=080544520X” height=”240px”]

 

These last three are on my to-read list, but I haven’t gotten to them yet.

[pageview url=”http://rcm.amazon.com/e/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=logiodicecom-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=0830810978″ height=”240px”]

 

[pageview url=”http://rcm.amazon.com/e/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=logiodicecom-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=0061964395″ height=”240px”]

 

[pageview url=”http://rcm.amazon.com/e/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=logiodicecom-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=0785288376″ height=”240px”]

If Truth was Stranger than Fiction – Erasing Human Memories

Imagine a world you could take a snapshot of your brain, and then, after completing a task, you can then erase the memories of all the tasks completed. That is the concept behind the movie Paycheck.

With today’s technology and scientific advancements, this capability is not yet a reality; however, continuing advancements in the realm of neuropsychological studies, Ligand-Directed cell targeting, combined with the eccentric theories of a brilliant astrophysicist, that science fiction may someday be a reality.

I thought I would use this week’s University discussion to press our minds into the brink of reality. In doing so, please note, that while I am not claiming that we can erase memories with our current scientific knowledge, I am citing scientific studies and theoretical postulates that accrue support for my views that one day, it may be possible to erase memories.

In 2006, Mueller reviews the advancement of neurological studies for the underlying biology of memory formation, studies such as those being performed by Reissner, Shobe and Carew (Meuller, 2006). Regarding this study, Mueller states that “the demonstrated application of nodal analysis to a well investigated signaling pathway implicated in learning and memory elegantly demonstrates the potential to unravel complex molecular networks and to extract the essentials (Mueller, 2006).” Almost eight years prior, J.D.E. Gabrieli discussed the increasing capabilities of positron emission tomography (PET) and functional magnetic resonance imaging (fMRI) to help identify portions of the brain that were active during learning and retrieval of specific types of memory (1998). Additionally, a purview of 40 years of neuroscience will show the significant strides we continue to make in the field of neurological studies (Kandel, 2009).

 

As scientific knowledge and technology advances, it will only become easier to identify the areas of the brain where memories are created and stored.

Frank Tipler, in his book The Physics of Christianity postulates his theories of the future of humanity. His views, based on theories around the Bekenstein Bound, baryon-annihilation and quantum computing, states that he believes humans will eventually be able to download copies of themselves into Artificial Intelligence constructs (Tipler, 2007).

Papers (which I really don’t claim to understand) around Ligand-Directed gene and cell targeting, outlines our current and growing capabilities around being able to target and address substances that meet certain biological criteria (Hajitou, et al., 2006).

Bringing all these current theories and studies into a synthesis, I propose that someday in the future, we may be able to tag and identify the current state of our memory through neurobiological methods, or make an imprint of what our current brain structure is like, right down to the atoms and molecules (Tipler, 2007). Upon taking a copy, we can then learn new concepts (such as the super-secret patented recipe for Coke or Pepsi). After the completion of our learning, we can either use future Ligand-Directed tagging to identify and target for destruction the changes in our neurology, or we might just prefer to restore ourselves to a previous state.

Sometimes, truth can be stranger than fiction.

References

Gabrieli, J. D. (1998). Cognitive Neuroscience of Human Memory. Annual Review of Psychology, 87-115.

Hajitou, A., Trepel, M., Lilley, C., Soghomonyan, S., Alauddin, M., Marini , F., . . . Arap , W. (2006). A Hybrid vector for ligand-directed tumor targeting and molecular imaging. CELL, 385 – 398.

Kandel, E. (2009). The Biology of Memory: A Forty-Year Perspective. The Journal of Neuroscience, 12748-12756.

Mueller, U. (2006). Memory: Cellular and molecular networks. Cellular and Molecular Life Sciences, 961 – 962.

Tipler, F. (2007). The Physics of Christianity. New York : Doubleday.

 

Deleting your Facebook account (again?)

 

A good friend just posted this as an important reminder to people on their privacy on Facebook; however, I think we must dig further into the problem to understand it.  Point being:  Facebook is not the problem.  Pop over and read this article, then come back and see what I have to say.

I deleted my Facebook account

Postman is still on my to read list along with a is for ox, once I finish the Gutenberg elegies, but I think our culture is far worse off than postman indicates, it is both Orwellian and Huxleyan to the extreme.

What people cannot forget is that it is not FBs fault, they are providing a service that is filling a void in the culture.

Deleting your Facebook account will accomplish nothing. Being conscious of how our consumerism is used against us and acting accordingly is more appropriate.

How many of us tag our restaurants, link the movie we just finished watching, follow our favorite author or sports team all on Facebook?

Now the real question is, how many of you do so remembering that every button you click, link you follow and picture you view is stored and sold to the highest bidder?

Understand that Facebook is facilitating what the mass is asking for, it is not stealing your data, you are willingly providing it because of the benefits you receive.

Boycotting, deleting or complaining is not going to do you a lick of good; being informed however and acting intelligently on that information is where you will find the most value.

In fact, if you do delete it, I’ll give you less than 6 months before you come back, as we are all slaves to our culture in one way or another.

Principles of Authentication

 

Recently, I have been surprised at how little some of the application architects I interact with seem to know about the principles of authentication, and I mean, these are smart people too! When I went out to look on the internet to find some white papers I could send their way; I really found nothing of value. So, while this is in initial draft document, and I haven’t obtained any feedback from my fellow Security Architects, I am providing it here for the interested to get a better understanding of my views, as a security architect, of some of the basic principles of Authentication that I have always taken for granted.

 

 

 

Principles of Authentication

Defining a secure method of participant identification

Contents

Terms & Definitions    3

Participant    3

Identification    3

Authentication    3

Authorization    3

Accountability    3

Security Domain / Boundary    3

Claims    3

General Guiding Principles    4

Authentication of Participants    5

Three principles of Authentication    5

Shared Secret (Something you know)    5

Token (Something you have)    5

Unique characteristics (Something you are)    6

Authorization    6

Accountability    7

 

 

 

Terms & Definitions

 

Participant

A participant is an identity taking part in a business communication transaction. A participant may be represented by an end user, a target system, or even an entity facilitating the transmission of communication between two unique identities. A participant may have multiple identities within multiple security domains, but should be uniquely identified with a single identity within a single security domain. An example of participants may be a business user, a database, or a web service.

Identification

Identification is the method by which a participant asserts their unique identity within a security domain to another participant within that security domain.

Authentication

Authentication is the act of validating a participant based on the participant’s asserted claims or identity attributes. Authentication requires a shared secret between participants or attestation from a trusted source that asserts the integrity of the participant’s claims.

Authorization

Authorization is the act of approving access for an identity to a resource based on a successful authentication.

Accountability

The purpose of Identification, Authentication and Authorization is to maintain accountability tied to a unique identity within a single security domain, to ensure the integrity, confidentiality and availability of a system and its associated data.

Security Domain / Boundary

A security domain represents a functional environment that maintains a governed trust between participants either through shared secrets or through the use of another participant acting as an arbitrator to attest to the authenticity of participant’s claims.

Claims

A claim is a statement of fact about a participant used to assert an identity for authentication. A claim is usually a data artifact that is questionable in nature (e.g. I am who I say I am).

General Guiding Principles

 

  1. A participant may have multiple identities, but an identity must be unique within a single security domain.

     

  2. Identification, Authentication, Authorization and Accountability requirements should be dictated by the level of assurance within the system and the associated data classification.

     

  3. Identities must be authenticated and appropriately authorized before obtaining access to non-public data.

     

  4. Identities must be re-authenticated when crossing security boundaries.

     

     

 

 

Authentication of Participants

In order to ensure the confidentiality and integrity of business communications that contain non-public classified data, all participants within a business transaction must be authenticated before being allowed to participate within that business transaction. The foundation of authentication is based off of three primary principles where a participant asserts their claim of identity through something they know, something they have, or something they are.

Take for example, a person (participant) may walk up to the security guard of an organization (participant) and say (claim), “Hello, my name is Jack, please let me in”. While Jack has identified himself, there has been no assertion made proving his claim. The security guard may now ask Jack to enter his personal identification (PIN) code (something he knows), may ask him swipe an RFID badge or present a driver’s license (something he has), or may ask him to have his retina scanned (something he is), in order to provide access for Jack to the building.

After authenticating Jack, the security guard provides him with a badge that will attest to Jack’s authorization to be inside of the building. Jack has now crossed the security boundary of the outside world, into the organizations world. Jack as a participant, now has two identities, his identity associated with his license, and his identity associated with the badge he was provided.

In this scenario, we have identified the three principle foundations of Authentication: 1) something you know, 2) something you have, and/or 3) something you are. Additionally we have identified both direct and indirect forms of authentication, and have illustrated the principle necessity of a security boundary for appropriate authentication and authorization.

All three authentication principles, as well as the concepts of direct and indirect authentication and security boundaries are discussed within the remainder of this document.

Three principles of Authentication

Shared Secret (Something you know)

A Shared Secret is one of the foundational principles that often drives authentication. The secret represents information maintained between two participants that can be used to uniquely identify one or both of the participants within a security domain.

Within the example above, a shared secret was previously configured between the organization and Jack, such that, if Jack was able to provide that shared secret back to the organization, the organization could be reasonably sure that Jack was indeed who he claimed to be. In this scenario, as the organization was able to verify Jack’s claim directly, this was a form of direct authentication.

Token (Something you have)

A token is another form of authentication that represents a claim or a collection of claims that can be used to attest to a participant’s unique identity within a security domain. Tokenized authentication is based on a predefined trust between participants or security domains.

Within the example above, we identified multiple types of tokens that Jack may use. The first type of token was an RFID badge issued by the organization. Because the organization has a direct means to authenticate Jack based on a previously established relationship, this is another example of a direct authentication.

The second type of token discussed was Jack’s license. If the guard chose to authenticate Jack on the license he presented, the guard would be confirming Jack’s identity based on the attestation provided by a trusted third party (another participant). As the guard’s knowledge of Jack relies on the attestation of a third party, this is referred to as indirect authentication.

Within the context of our example, the security guard can use the indirect authentication method to verify Jack’s identity. As there are no current trusts established between the building security system and the license issuing authority, Jack will cross a security boundary, and this indirect authentication cannot be used to grant authorization for Jack to enter the building.

Thus, the security guard must, based on his indirect authentication, provide Jack with a set of claims that are understood within the organization itself, so Jack can be directly authenticated within the building complex. This repacking of claims from one authentication participant to another authentication participant is often referred to as Federated Authentication.

The organization may also implement another security framework in which a trust could be established between the security domains of the organization and the license issuing authority, such that Jack could authenticate to the organization’s security system directly using his license. This authentication framework is a form of pass-through authentication.

Unique characteristics (Something you are)

A unique characteristic of a participant is another form in which a participant may be identified. Unique characteristics of a user might include facial recognition, fingerprinting, voice recognition or retina scanning. Note that this form of authentication is typically used to authenticate user participants as it is arguably easier to replicate the “unique” characteristics of a non-biological entity.

 

Authorization

Once a participant has been uniquely identified within a security domain, the participant that is facilitating the business communication must make a decision as to whether or not an authenticated identity has been approved to operate on a secured resource. The discussion of detailed authorization requirements are outside of the scope of this document, however, future documents may be written to address authorization specifics in more detail.

Accountability

The primary goal in providing identification, authentication and authorization is to ensure accountability throughout a business system or organization. Thus, it is incumbent upon a system that has first identified, authenticated and authorized a participant to access a business resource to keep proper records of what the participant has done with their granted access. The decision of detailed accountability requirements are outside of the scope of this document, however, further documents may be written to address accountability specifics in more detail.

Someone is always watching the watchers

[Short Snippet from this weeks course paper]

With the continued increase of the connectedness of humanity through the internet, coupled with the increase of opportunity to facilitate and hide malicious digital actions, the perpetration of digital crimes is on the rise. However, being that we are in a war against the criminals, and one in which we are rapidly losing ground; it seems all-to-appropriate to relinquish our reticent nature as the good-guys and look to examine ways in which we can fight fire with fire. Online Digital Forensic capabilities provides one of the means to increase our effectiveness through extending the reach of individuals with specialized skills, providing technological capabilities to analyze data in real time, and increasing the speed of data acquisition.

[However, this weeks course work reminded me eerily of] some of the central themes espoused by George Orwell in 1948 when he wrote his exceptional work titled 1984. Through this monumental work, Orwell describes a dystopian type world where there is physiological, psychological, and sociological paralysis brought on by the persistent concern that Big Brother is watching. I could not help but reminisce over the fears held by protagonist Winston that the Party would discover his thought crimes.

On-the-other-hand, as an individual who has been involved in some fashion or another, for over 15 years in the field of information security, I understand, full well, the importance of investigatory needs to protect the innocent from the guilty. These needs often require searching and viewing personal information that suspects believe to be private.

Yet, those of us involved in the societal war surrounding information security, those in a position of authority, and those whose responsibilities involve writing the laws that protect and serve, must not forget the adage attributed to Benjamin Franklin stating that those who give up their fundamental freedoms to obtain temporal safety deserve neither freedom, nor safety (Franklin & Franklin, 1818). And so we must remember that we are also consumers, and reside within the same economy of human existence as our suspects, and therefore, it is prudent to remember that someone is always watching the watchers.

References

Franklin, B., & Franklin, W. (1818). Memoirs of the life and writings of Benjamin Franklin. London: Henry Coulburn.

Internet beware – it all started with the letter E

I started using the internet almost 20 years ago; and while I was a minor, with no job, I gained internet access in sometimes nefarious ways.  I spent my time on the internet staying out of trouble (or not getting caught), but let’s just say that I was no Angel, and my purpose for being on the internet was to learn as much as I could. 

As a result of the last 20 years of active involvement in security, I have learned to think like the criminals, and know how to attack and protect against their wily ways.  As a result, you would have a very hard time finding someone as paranoid and cautious as I am on the internet. However, this afternoon, I was a victim of Internet fraud.  Take a few minutes to listen to how I fell victim, and how I responded. 

Hopefully, the information presented here will help make you even more cautious as you fire up your browsers and go strolling down the streets of the ghetto at the midnight hour, in the pitch black.

Victims of Internet fraud often fall into two categories: those who are not paying attention (inattentive), and those who are uninformed (ignorant).  In my case, it was a combination of both.

When working on the Internet, my fingers and I have this agreement:  I think, and they type.  There really isn’t a lot of surface level communication that goes on between my fingers and brain.  I can be talking to someone about one thing, thinking about something else, and typing a third, and completely unrelated thing. 

The Inattentive phase

Sometime this afternoon while trying to deal with some online marketing things I have been doing, yelling at my boys to stop yelling at each other, and thinking through issues of regulations around export controls, I opened up my internet browser and typed in Facebook.com.  The only problem is, My fingers rebelled, ever-so-slightly, and they misplaced the E.

At the same time, as my fingers are misbehaving, somewhere out on the internet, an attacker is sitting and patiently waiting with a domain registered to a very slight variation on the name of Facebook.  This server domain name (it’s like the computers postal address) is registered in Tijuana Mexico but the traffic is forwarded to another domain registered in Panama City.  That domain is hosted on a server in the Bahamas. 

As I’m flipping through different browser windows, I come back to my “Facebook” page, and see that it is displaying a "survey" which purports (although never directly states) that it is from Facebook.  The survey, a three question survey, was filled with questions like "what do you think about social networking, do you think it brings you closer to friends, do you have any suggestions for us to make it better".  After 30 seconds, I was complete, and ready to be directed back to Facebook (or so I thought), and then the site showed a screen that said "put in your phone number to register for a giveaway".

“Eh, I suppose if Facebook wants to spend $300 out of it’s billions of dollars to give away an iPhone, my 3GS could be upgraded. Besides, what’s sensitive about my phone number, it’s on the do not call registry, and I could change it at any time for $30 dollars.”  This is what is going through my mind, as I’m continuing to yell at my boys who are yelling at each other, and at this point almost coming to blows; while I work on some marketing material and skip back from the BIS page on export controls.  After putting in the phone number, I got a text message saying "this is the code you need", and subsequently the web page prompted me to enter the code. 

“Yeah, sure, I guess”, – that’s what went through my mind.  I mean, really, what harm can come from putting in a code they just sent to my phone – there is nothing personally identifiable about that…

The Ignorance Phase

What I didn’t realize is that in the world of Cell Phones there is a whole billing infrastructure with the cell phone companies that if someone text’s you a code through the phone company, and you then give them that code which they represent to the phone companies, that equates to an electronic signature, and the phone companies then assume that you are agreeing to be billed for a specified amount (or a reoccurring specified amount).

So here I am, I have this “digital signature” in my hand, and on the next page there is a big spot to put in your code and some tiny itty bitty print – that no one ever pays attention to, right?  I typed in the code and hit submit; and the page came back and said “I’m sorry, this offer is full, would you like to see another one”?  At this point I was like “WTF!"?”.

I skimmed the page and saw the “very fine print” that said, “by entering this code you are registering for a monthly service plan for free ringtones”.  No big deal though, right; the page said that I couldn’t be entered because the deal was already full, and I should try signing up for another one.

The Response

So, I wasn’t paying attention, and I didn’t know how cell phone companies support billing services through text messaging.  But at this point, I already knew I had fallen for a scam.  So what did I do?

The first thing I did was get right on the phone to AT&T.  To hell with this company that just told me they couldn’t sign me up because they’re register was full (and I do not mean that euphemistically either) – I knew I couldn’t trust that as far as I could throw it. 

I immediately got on the phone with AT&T and had them reverse the charges and cancel the reoccurring charges.  I have an appointment with their fraud department tomorrow (they were closed today), so that I can give them as much information as possible so that they can prevent this from happening to other people.  Which leads me to my second step – I told everyone I know about it.  Sure, in the end, there might be someone who is going to say “Haha, you gots pWned” – but my response would be STFU (that’s more euphemistically).

You see, these people prey on the lack of communication; they prey on the fact that by jumping through multiple international boundaries they are all but assured they will never be pursued.  They prey on the fact that the cell phone company can just write off a couple million dollars in fraudulent charges.  And yet, the worst thing I could do is not tell everyone I know to keep an eye out, so that they too, are not victimized.

Which comes to the third and final thing I did.  I went to the Internet Crime Complaint Center (http://www.ic3.gov/default.aspx) and the FTC Complaint Center (https://www.ftccomplaintassistant.gov/) and filled out their complaint forms.  Sure, as small as this fraud attempt was, they could care less; however, perhaps these people have been defrauding individuals out of millions of dollars, perhaps every little bit of evidence they collect increases the chance that that’ll go after these guys.  But in reality, it just gave me a great feeling to tell on them!  LoL

So Remember

In the end, as a consumer surfing the internet (as you likely do – if you are reading this), keep the following in mind:

  • Suspect everyone;
  • Trust no one;
  • Verify, verify and Verify;
  • Pay attention;
  • Educate yourself on the technology you use;
  • Decrease the possibility that the crime lords will collect anymore money: tell everyone;
  • If you think you were the victim of internet crime, act immediately!

You know, these guys are smart, they’re never going to catch them, even if they go after them.  So in the end, I just tell myself that somewhere in the world, there is an internet crime lord who is having a beer on me.  Drink it up buddy, because it’s going to be awfully hot in hell!  Winking smile

Size does Matter!

So, yesterday evening, I was relaying to Donovan the large change over the course of my short life in the size and power of the personal computer.  We researched some of the first computers, and I even introduced him to punch cards.  As a side note, I still cannot find my piece of Mylar punch tape – wherever did it go!

Anyway, in reviewing an announcement that came a few weeks ago by Intel, I found this bit of information.  Intel now has one of the smallest Solid State Hard drives on the market.

I’ve been impressed at the size of the 2.5 inch hard drives that go into laptops (they’re roughly the size of an American dollar bill).  Take a look at the latest 80 GB hard drive, compared to the dollar size 2.5. 

Pretty soon, we’ll have watches that can store a terabyte of data – what do you think of that Mr. James Bond?

 

intel_310_ssd2

AVG – Are they untrustworthy?

 

This afternoon I updated to AVG Free 2011, and a short while later, I was presented with this popup to scan my system with the PC Analyzer.  I figured, what the heck.  When the scanning was complete, I noticed that it said my hard drive was 52% fragmented… and if I wanted to fix it “once” i could do so for free, or buy a 12 month subscription.

Well, being the savvy user that I am (and also concerned at how my hard drive could become so fragmented) – I grabbed windows Disk Defragmenter tool and checked my hard drive.  Windows reports that I’m 1% fragmented, and AVG reports that I’m 52% fragmented.

Now, AVG has always seemed to be an excellent tool, and I have recently stopped using Trend Micro and Norton (both of which I used to pay for) for the simple and seemingly solid protection of AVG.

However, I have to ask – is their Fragmentation engine just that buggy, or are they being dishonest and unethical by representing a level of PC Problems that do not actually exist, thinking that most users will just run out and buy their additional software…

 

image

 

Either way, I wasn’t so impressed with AVG’s PC Analyzer Product.