[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-Disclosure] Sick of stupid analogies



And... I'll give this one a + -10

-b

On Mon, 2004-09-20 at 17:44, Stryc9 _ wrote:
> What is with the current state of debate in the Information Technology
> sector? Why does every post seem to follow the very illogical and
> seemingly uneducated format of:
> 
> 1.) point
> 2.) bad, stupid analogy
> 3.) ???
> 4.) I am right!!
> 
> Stop using farking analogies!! You aren't talking to your IT director
> or Project Manager here... we all understand the issues and the
> technology surrounding them.
> 
> All further communications containing analogies will be moderated -5 Retarted.
> 
> On Mon, 20 Sep 2004 14:57:13 -0400, glenn_everhart@xxxxxxxxxxx
> <glenn_everhart@xxxxxxxxxxx> wrote:
> > Think of this not so much as criminal vs. noncriminal but in warfare
> > terms. Security defenders have to design fortifications to keep out
> > attackers.
> > 
> > If I am trying to build field fortifications and my forces have captured
> > one of the enemy's designers of attacks, I might very reasonably want to
> > pick his brain to help me get better defensive designs.
> > 
> > That doesn't mean I will (or should) believe he has come over to my side
> > of the conflict, nor does it mean I would have him design any part of my
> > defenses, lest he build in weaknesses. Yet if I tell him of various defenses
> > and he tells me of attacks on them which I had not considered, I may find
> > value in his advice. What I have to validate for myself, even though I
> > distrust its source, still has some usefulness.
> > 
> > The thing is, if I am fighting a war I can probably find people to guard 
> > this
> > guy and make sure he doesn't see anything but what I show him, and keep him
> > from escaping back to rejoin or inform his old friends.
> > 
> > A company wanting to do this had better be more confident than most in its
> > ability to build internal barriers to information, and in its ability to
> > watch what of its sensitive information gets into the enemy or ex-enemy
> > hands, and what leaves them for where.
> > 
> > They should remember: if the captured enemy designer should retain his old
> > loyalty and report their secrets to other enemies, the value of that 
> > company's
> > secrets will be lost.
> > 
> > So how good is the internal security being practiced by the hiring firm?
> > Does this indicate, perhaps, some overconfidence?
> > 
> > Glenn Everhart
> > 
> > 
> > 
> > -----Original Message-----
> > From: full-disclosure-admin@xxxxxxxxxxxxxxxx
> > [mailto:full-disclosure-admin@xxxxxxxxxxxxxxxx]On Behalf Of Harlan
> > Carvey
> > Sent: Monday, September 20, 2004 1:20 PM
> > To: full-disclosure@xxxxxxxxxxxxxxxx
> > Subject: RE: [Full-Disclosure] Scandal: IT Security firm hires...
> > 
> > > > Does it not strike anyone that there is a
> > > disturbing trend in
> > > > malicious hackers (yes, yes, I know, they are not
> > > hackers if
> > > > they are malicious, so call em whatever you want)
> > > getting
> > > > hired to security firms,
> > 
> > Regardless of the reason for hiring these individuals,
> > this fact should be noted by any organization subject
> > to legal or regulatory compliance with regards to
> > computer/information security.  While the laws in the
> > US do not specifically stipulate that reputable firms
> > must be used when seeking compliance with vuln/risk
> > assessments, etc., one would hope that the
> > professional reputation of the assessing firm would be
> > considered, as well.
> > 
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> > 
> > 
> > **********************************************************************
> > This transmission may contain information that is privileged, confidential 
> > and/or exempt from disclosure under applicable law. If you are not the 
> > intended recipient, you are hereby notified that any disclosure, copying, 
> > distribution, or use of the information contained herein (including any 
> > reliance thereon) is STRICTLY PROHIBITED. If you received this transmission 
> > in error, please immediately contact the sender and destroy the material in 
> > its entirety, whether in electronic or hard copy format. Thank you
> > **********************************************************************
> > 
> > 
> > 
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> >
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
-- 

-- Unix is sexy. "find", "talk", "unzip", "strip", "touch", "finger", 
"mount", "split", "unmount", "sleep".

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html