The management of the bank where I worked in the 1960s trusted my abilities and handed me the key to the door of one of the bank’s main vaults.
One day my Indian colleague asked me to lock the locker door on his behalf, as he had to go to the hospital.
After work, I closed the inner door of the safe, because I was in a hurry, something went wrong and the door was not fully locked. I hastened to turn the cupboard, before it closed completely, so it was impossible to lock it!
Fearing that I would be exposed, because of my young age and ignorance, I called my mother and asked her to send me two blankets and a pillow, and I decided to sleep in front of the closet door to guard it, because I did not know what to do, and I also did not know the address or phone of my colleague’s house!
The next morning I told my colleague what had happened, and he burst out laughing at my naïvety, and said that the bank kept the PIN and the replacement key with a bank, and it was easier to dial it and re-lock the door of the safe.
Every device, computer system, mobile phone, or any control or accounting system needs back up, so that it can be resorted to in the event that the systems of the concerned party are exposed to hacking or sabotage. The support system can be inside or outside the organization, or in another country, which is called in some systems the Icloud, which may be local.
This requires the presence of giant servers or servers that can keep a huge amount of information and retrieve it, whenever necessary and these parties are local or global and a source of trust, such as printing state money, for example.
The process of backing up information on computers is a copy of all files and data so that the original is on your device, and the other is outside, using one or more backup methods.
Consequently, each party chooses the appropriate method for backing up its information. Hence, global entities were established in Europe and America that save information on behalf of their customers for a reasonable fee instead of spending huge amounts of money on buying their own servers. Each method has its own advantages, disadvantages, and security consequences.
A clip from a television interview with the academician Safa’a Zaman, President of the Kuwaiti Information Society, was published in which she stated that all the information related to the data of the Civil Service Commission is on servers in Egypt, and that if it is penetrated this could pose a threat to the security of the state.
The government spokesman denied this, as did the Civil Service Commission (CSC), and confirmed that they have huge “servers” that cost the state a lot and are difficult to penetrate, and even accessing them requires a code through another encrypted device. The back up support system at the CSC is both internal and external, but certainly not in Egypt.
Safa’a Zaman recently returned to her previous warning and the CSC informed the Public Prosecution of the case, so was referred to investigation on charges of undermining the prestige of the state and harming relations with Egypt.
She was released on 1,000 dinars bail. It was subsequently reported that she made her statements based on her specialization and out of concern for the interest of her country, and she did not intend to influence its security or offend a sister country. We stop here since the issue is in the hands of the judiciary!
Note: Representative Hamad Al-Matar intervened to defend Zaman, and promised to reveal what documents he had to prove the validity of what she mentioned, but days passed and we did not see or hear anything what MP Al-Matar had promised.
By Ahmad alsarraf