lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200405032318.i43NIT6K012015@turing-police.cc.vt.edu>
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: A rather newbie question 

On Mon, 03 May 2004 12:43:19 PDT, Harlan Carvey <keydet89@...oo.com>  said:
> even the most rudimentary security awareness), then
> shouldn't the admins be required to have a law degree,
> also?  How about a hospital...shouldn't each admin
> then have to have a medical degree?

I would *HOPE* that even if a hospital doesn't require a medical degree for its
admins, that they at least require *all* the support staff (admins, janitors,
orderlies, etc) to have some very basic understanding of enough procedures so
that they at least don't do any harm:

1) Don't go into rooms with a Quarantine sign unless you don't intend to come
out...

2) Know the rules of which way you should jump if a crash cart is coming down
the hallway..

3) What a biohazard symbol is, where you should find containers with that
symbol, and what to do if you find a biohazard container where it shouldn't be,
or a biohazard that isn't in its container...

You know, the same basic level of knowledge we wish they had regarding
computers, the "Don't click on the 'OOooh Shiny!' attachment" level....

(And I am told that in fact, hospitals *do* require all their staff to get
at least "basic CPR" training and the like...)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040503/47e93395/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ