|
A term for describing computer systems that exhibit an extreme absence of computer security considerations.
Nomenclature By observation one can notice that Star Trek personal almost never enter passwords while most corporate users are forced to maintain dozens of passwords to perform their daily functions. Star Trek's disregard for even the simplest computer security measures is legendary among Computer Security practitioners.
Security Triangle
Such systems can typically be placed to the far right of the Security Triangle indicating the system is highly easy to use and functional; however, offer little in terms of security.
In Popular Culture
* In popular culture layman can see such systems demonstrated in the popular TV series Star Trek.
Examples From Star Trek
* Unauthorized persons can access the internal communication systems.
* Unauthorized persons can ride the Turbolift to the bridge.
* One can access critical ship systems from the Grade school classroom computer systems.
* Most doors are unlocked and do not require a key, password, or Security token for entry.
* One can bypass security by simply changing the Security Crystals which are often located on the "locked" side of the door in an accessible panel.
* It is not required to authenticate oneself to a system before making drastic changes or during crew shift changes.
*Unauthorized persons can access the .
* Normal users can delete logs of activity.
History
Coined by Jason Muskat, a noted Computer Security Engineer and Certified Instructor, during a Certified Ethical Hacker course lecture in 2007.
|
|
|