Ir al contenido principal

A kid? A kid just broke my program?

LNowadays is common to think that anyone can use your software. In this group of anyone, there is the group of people who know and people who doesn't. We, as software engineers, need to take I to consideration both sides because just anyone can get access to  information that might not be for them. A clear example of that is Netflix, which includes a restriction for kids, or YouTube and even Facebook.

To get to that point we need to think in our users,  and what they could do. In software engineering there are many methods to create these elements and to really analyze if they are really necessary restrictions or add-ons. On the other hand, we need to take into consideration the data that we are managing and to really send it in the correct way  to avoid people who steal our information even though that we are not that famous or important.

In the case of the movie  War Games, set at the begining of the internet connection as a service, who anyone can access just by a call and they didn't think the point where this method  could get them to. In this case, an important element to take into consideration is that the main company who had access to this kind of technology is the USA government. They didn't take into consideration the security to access to their systems and that everyone who had access to a computer was connected to them . We normally think that a password is something just enough to protect our information. In those days information was sent just as text or as signals so anyone could access  their secret programs with just a small imagination.

In this case, the movie presents a problem in the USA government access to  their secret war system and create an imaginary war, caused by a kid with just a telephone and enough time.  In this case the problem was generated due to  a backdoor in this program.  I consider that we should always take into account that  we need ways to access as developers  to our systems and to what we are creating, but this way needs to be a something more hidden such as the eggs in the book we are reading, up to the point where people cannot access or even forget about  this.  In this case we have learned from the problems that we've been through and  increased security up to the point of encryption, double access, keys, and so on which is a great advantage in our society. Also it is important to mention that in our are we cannot see at first sight the leaks, the problems, and what we are really doing, so we need to observe  and analyze our systems.

Comentarios

Entradas populares de este blog

I am blind without my glasses

As far as we have learned in all our classes, we should always think of our clients need and uses. But after we get the requirements, a war starts due to the fact that everyone wants to set their point or perspective as the most important one. As we have learned from this case, there is no wrong perspective, but a blindfold one. We tend to seek out what we know and to think that this will be the right answer,  because that is what our story and our world works, but there are many other options.  In this case, I can relate this case to what we live everyday on our classes, where we need to create teams with our classmates. Normally we create these teams with our friends even though they have got the same perspective  and abilities as us. This case becomes a problem because when we need to understand what the client needs and desires we can only see one way of it, when there are many others. We need to think in our users, that could be our friend  or a stranger in an...

Is UX the new design?

Nowadays there  are many ways  to create a new project, a new program, or even a new add-on, but we  live in a society  that lives in the time  where changes are needed  so soon that  sometimes design  is  not done  when it is supposed to, or a methodology is not followed, because we are focused on the project and not  the  way we develop the project.  These ideas were affected by the way technology, clients and users change their ideas and necessities.  We have been developing new ways to satisfy them, but in the process, we have been forgetting the steps that we need to follow to correctly create a new thing. Sometimes we try to develop the necessities that we think that the client has to have,  but we are not truthly sure about it.   An example of what has been told is the point where we start using Extreme Programming to develop a project. When we use this methodology, we tend to forge...