Satnam Purewal

CIPT, CISSP, CISA, CISM


Privacy and cybersecurity specialist with experience in IT audits and security for systems implementations in retail,  insurance, financial, and aerospace industries. 

Articles Published in The Vancouver Sun (Vancouver, British Columbia)

Computer-information Confidentiality Essential

Ensuring privacy of information in the age of computers and the Internet concerns us all as the abuse of access to information systems becomes increasingly prevalent. By abuse, I mean the use of data for purposes for which it was not originally collected. Almost 50 percent of organizations responding to the 1997 Computer Security Institute/FBI Computer Crime and Security Survey identified some form of unauthorized use of their computers in the last year.

Campus Computing & Communications

To Copy or Not To Copy

It is in everyone's best interest to use software in a legal and ethical manner. Since the use of each piece of software Is subject to different restrictions, please review the license agreements that come with your software carefully. In general, you do not have the right to: - Receive and use unauthorized copies of software. - Make unauthorized copies of software for others. - Leave a copy of commercial software on public computers.

Software Piracy: It's a Crime

Software piracy - the illegal distribution or copying of software - costs the software industry billions of dollars every year. According to the Business Software Alliance the software industry in Canada and the United States experienced a loss of $3,131,455,600 - 21% of the world total - from software piracy in 1994. Losses in Asia and Europe were higher at 29% ($4,350,981,640) and 39% ($6,002,681,255) of the world total.

Your Responsibility as an Interchange or Netinfo Subscriber

All Interchange and Netinfo subscribers and all other users of computing facilities and services on campus, must respect UBC's Appropriate Use of Information Technology guidelines. Following these guidelines ensures that the university is an environment where everyone is treated with humanity and respect. It also ensures that you don't break any existing policies, laws or statutes, and that the university's computing systems remain secure.

Participate in Computer Security Day

This year's international computer security day is Wednesday, November 30. Computer Security Day began in 1988 when the Washington, D.C. chapter of the Association for Computing Machinery (ACM) Special Interest Group on Security, Audit and Control (SIGSAC) decided to bring extra attention to the important issue of computer security. The final day in November was chosen for computer security day so that attention remains strong over the holiday season when it might otherwise become lax.

Security ....It's Up to You

In 1960, following his study of security in government departments, Lord Radcliffe stated that "the single biggest risk to security is probably a general lack of conviction that any threat exists" (Information Security 15-350-102, May 1992). This is still true today. Most people feel that they do not need to be concerned about security because they do not have access to anything of interest. I often hear comments like "Why would anyone want access to my account?"

UNIXG: New Password Security Software

On November 22, University Computing Services staff added password checking software to UNIXG to help ensure the system's security. Password checking software is rapidly becoming a common feature of North American UNIX systems. It requires passwords to meet strict guidelines for complexity. Passwords must be six to eight characters long, contain a sufficient mix of upper and lower-case letters, numbers and punctuation and not be found in an on-line "dictionary," which is not a published English dictionary but an extensive listing of common letter and number patterns, specialized vocabulary, abbreviations and names as well as words.

Secure Passwords

With the rapid burgeoning of national and international networks, the question of system security has become one of growing importance. High speed inter-machine communication and even higher speed computational processors have made the threats of system "crackers," data theft data corruption very real. - Daniel V. Klein, Foiling the Cracker: A Survey of, and Improvements to, Password Security, an article sponsored in part by the U.S. Department of Defense.

Changing Environment: New Challenges in Network Security

"The most secure system is unusable, and the most usable is insecure." - Paulina Borsook "Seeking Security," Byte, May 1993, p 119. Before decentralized computing, mainframe computers and computer files were kept in highly secure areas; computing personnel ensured that the data, files and programs were secure, carefully managed and backed up regularly. Use of business application systems was tightly controlled, with the access often only permitted from terminals identified with a particular user and specific location. The basis of UBC's mainframe security was identification and authentication.