View/Open - JUWEL - Forschungszentrum Jülich
View/Open - JUWEL - Forschungszentrum Jülich
View/Open - JUWEL - Forschungszentrum Jülich
Erfolgreiche ePaper selbst erstellen
Machen Sie aus Ihren PDF Publikationen ein blätterbares Flipbook mit unserer einzigartigen Google optimierten e-Paper Software.
The most dangerous enemy sits in my chair<br />
The most dangerous enemy sits in my chair<br />
Dr. Tomäs Rehäk, Director ofthe Central Public Library of Prague<br />
Abstract<br />
To make our data safer might be quite a cheap task. The most common security flaws are<br />
usually quite easy to identify, however sometimes very difficult to remove because they are<br />
deeply mounted to our habits and corporate culture.<br />
Something about MLP<br />
Municipal Library of Prague (www.mlp .cz) is the biggest public library in Czech Republic .<br />
Well, the National Library has got bigger stocks but from all other points ofview we are the<br />
biggest one.<br />
MLP started to flirt with computers quite soon . Since 1982 all the new book records have<br />
been stored into computers . We have developed our own library system called Koniäs, which<br />
we have been operating since 1997. We have quite strong IT division staffed with more then<br />
14 full-time-equivalents . And they are very capable indeed with some members of the team<br />
being real stars.<br />
Something about myself<br />
I have been Municipal Library of Prague Managing Director since July 2002 . However I have<br />
been in MLP since 1992, starting as IT specialist, then head ofIT department and later deputy<br />
director. I graduated at Charles University in Prague at Faculty of Mathematics, Department<br />
of Probability and Mathematical Statistics. Because of my education my approach to IT has<br />
never been really technical and having been for few years out of IT business gives me a kind<br />
ofdistance. I am no longer really IT skilled man, but I still understand basic principles behind<br />
the scenes . And I have had responsibility for system security for many years . At the beginning<br />
that was administrator responsibility, nowadays it is managerial one. And all that together<br />
gives me fine point of view for my attempt to describe some general principles about system<br />
security .<br />
Foreword<br />
The aim of this presentation is just to share few thoughts how to make our data safer. I will<br />
give no really new bright ideas . All I will speak about are common and well known<br />
principles. May be they are so common and plain that we quite often forget to follow them . . .<br />
Before we get into different dangers which jeopardize our data and before we start to discuss<br />
how to challenge those dangers, let's start with one very simple principle :<br />
A chain is just as strong as its weakest link.<br />
here? Okay, let's have few examples .<br />
Simple enough? Too obvious to mention it<br />
35