Bruce Schneier on What He Knows Best 110
Over at CSO Magazine there's a wonderful interview with Bruce Schneier, where he talks about cryptography and security. He has several good points, such as the physical security industry versus the IT security camp, and how true security really boils down to people problems. There's some good commentary on post-9/11 airport security regulations as well.
Here's a link (Score:1, Informative)
Re:Here's a link (Score:1, Insightful)
Re:Here's a link (Score:2)
Sir Haxalot's posts help me, becaue I have to type with a straw held in my teeth, you insensitive clod!
--yours sincerely,
Dr. Stephen Hawking
CSO Magazine (Score:2, Funny)
Re:CSO Magazine (Score:1)
In a seperate filing the SCO Group also sued the CSO Magazine for illegally copying SCO IP from the Linux kernel, which is the sole property of SCO. CEO of The SCO Group, Mr Darl McBrid
Re:CSO Magazine (Score:2)
In a countersuit, CSO magazine accuses SCO of violating the DMCA by breaking the encryption used to obfuscate the word 'the'.
Bruce (Score:1, Funny)
Everybody's coming to get me
Just say you never met me
I'm going underground with the moles
Hear the voices in my head
I swear to god it sounds like they're snoring
But if you're bored then you're boring
The agony and the irony , they're killing me
I'm not sick but I'm not well
And I'm so hot cause i'm in hell
I'm not sick but I'm not well
Re:Bruce (Score:1)
don't mean they're not after you...
Kurt Cobain.
Post-9/11 (Score:1, Offtopic)
Re:Post-9/11 (Score:2)
[*] Come on, the day that really changed the world and you call it A NUMBER? All those other days have good names like Bloody Sunday, but a number... It sounds so empty, so devoid of emotions. Or maybe that's why it's used -- to show the world that America wasn't shaken, that the Star Spangled Banner is still waving (is that why the
Re:Post-9/11 (Score:1)
Re:Post-9/11 (Score:2)
These buildings had a great value, if not economical (was there really t
Re:Post-9/11 (Score:1)
You're actually saying there's no great economic value to office space in lower Manhattan? No one could be that misinformed; I conclude you are entirely uninformed. That is probably the most valuable real estate on the planet.
While we're at it, "economical" isn't the word you want, and "symbolical" is not a word at all. Try "economic" and "symbolic".
"... the Pentagon (have they rebuilt the part that was damaged?),"
Yes.
"Should new buildings be built in their place..."
"Should" is subjective. "Will" is
Re:Post-9/11 (Score:1)
Physical Security vs. Computer Security (Score:1)
Re:Physical Security vs. Computer Security (Score:1)
But, Slashdot always says... (Score:1)
Does this mean they arent really the experts they pretend to be? Im confused.
Paranoia rules (Score:5, Interesting)
I can see all of the glazed eyeballs out there as you tell folks that they need to learn about firewalls and computer security, etc. Some folks just don't want to be bothered.
Randon thought - with the decline of things like boot disk viruses, etc, best security most folks can understand is that they are safe so long as they are not on the internet.
it should be (Score:1)
Re:Paranoia rules (Score:2)
Well off course, imagine their looks if you told them they had to learn about locks and physicall security!
All they want to do is buy the lock and not loose the key. That's the problem with computer security: You can't simply buy the lock and try not to forget your password, you need to learn security. Way too much effort for busy people who have other things on their minds.
Re:Paranoia rules (Score:1)
Face it, people have been breaking security measures since the first one was thought up, and someone is going to come up with a new security measure to try to fix the old one. LOOP.
The only people benifiting from any of it are the people breaking the security and the people who are paid to come up with the new measures. The rest of us are just left to be vulnerable. Always.
"People problems" are the LAST of your worries (Score:2)
Re:"People problems" are the LAST of your worries (Score:1)
Re:"People problems" are the LAST of your worries (Score:2)
What industrial spy is going to bribe the guards when he can telnet? None. But quite often he can't telnet, but he doesn't need to bribe the guards; he can walk in anyway.
Re:"People problems" are the LAST of your worries (Score:2)
I am always entertained by my brother-in-law's tales of the physical security around the critical machines in the Army's command-and-control bunkers in Germany in the late 1980s. He was a civilian contractor doing installation and upgrades of the software written by his company. The computers themselves were physically isolated. The room was under armed guard. The guards never knew their watch schedule more than 24 hours in advance. A small number of people entering or leaving the room were selected a
Re:"People problems" are the LAST of your worries (Score:2)
If you have computers without passwords, that's because people didn't put passwords on them. If the serviceman's door is unlocked, it's because the administration didn't make a rule that it should be locked, or because there was a rule but nobody cared about it, or because leaving the door unlocked was the only way to get some other job done.
In other words, people problems again.
Thing is,
Just today ..... (Score:1)
Cringely's view on security -- log analysis is key (Score:5, Interesting)
Cringely put out an article (Changing the Game: How to Save the World by Taking Back Control of Our Data) [pbs.org] a week or so back emphasizing security through recording all activity in any given IT infrastructure. Cryptographic techniques may be great, but social engineering, cracked buffer overflows, and short-sighted or stupid actions can always leave some crucial data exposed.
Rather than throwing your hands up when you've found you've left data exposed, or you've discovered some insider has been poking around documents they shouldn't be looking at, you should be able to track down all access to all information at all layers of your infrastructure. You hopefully can uncover traces of specific incidents, find any other similar unnoticed events that are now part of history, and find the culprits.
So logging and log analysis are key to securing any site. You need to log:
... and you need to do it in a way where you can correlate information from all these disparate sources to uncover patterns of abuse. Cringely mentions that Addamark [addamark.com] (he calls them the next "Oracle") is the first company with a viable solution for storing and analyzing the massive logs involved. I've looked at their site, does anybody know anything about this product? Sounds very useful.
Too late is too late (Score:2)
For my own part, postmortems aren't nearly as important to me as preventative measures. But that's just me.
--Richard
Forensic investigation matters more than you think (Score:1)
Mr. Schneier contrasts problems of physical security with IT security throughout his article and emphasizes that in both domains criminals and terrorists will, at times, hit their mark. (He also implies losses to crime are greater than losses to terror, and that society emphasizes the terror while neglecting sensible countermeasures to crime -- but that's beside the point I want to make here).
In the physical world criminals always leaves tracks. Fingerprints, footprints, bodily fluids, DNA, personal ef
Re:Cringely's view on security -- log analysis is (Score:2, Funny)
Isn't that recursive?
I just want to put on file that I put on file that I put on file that I put on file that I put on file that I put on file that I saw somebody read a file on disk. Damn, now I need to report myself.
Re:Cringely's view on security -- log analysis is (Score:4, Interesting)
"Definitely. Terrorism is rare, while crime is common. Security systems that require massive databases in order to function--TIA, CAPPS 2--will make crime easier. They'll make identity theft easier. They'll make illegal government surveillance easier. They'll make it more likely that rogue employees of the governments and corporations that maintain the systems will use the data for their own purposes. In the United States, there isn't a government database that hasn't been misused by the very people entrusted with keeping its information safe. IRS employees have perused the tax records of celebrities and friends. State employees have sold driving records to private investigators. This kind of thing happens all the time."
Audio Interview (Score:4, Informative)
An example (Score:5, Interesting)
For the two years I've been doing this, I've had a small, running battle with the president of the branch, who wants to enforce a rule that all use of safety deposit boxes must be done in the booths provided for privacy; presumably, he wants to avoid any appearance of, or liability for, the bank employee knowing what's in my safety deposit box. However, switching the tapes in the box can be done in 5 seconds right there, whereas taking a booth makes it a 2 minute affair. The tellers all know me, so they let me do it right there, except for the couple weeks after a stern policy memo has been issued.
The reason I don't sacrifice another 1 minute, 55 seconds, is because I don't care that the tellers know--they'd figure something out with my weekly trips anyway. But the real crux is that, putting the tape backups into a safety deposit box makes it one of the strongest links in the security chain. The server room door is always locked, the servers logged off, etc. The weakest link now is that a competitor would offer one of my employees $20,000 to sneak the tape backups out one night. In comparison, the cost of breaking into a safety deposit box, removing the tapes, and returning them after copying, all undetectably, would be in the hundreds of thousands of dollars, if it could be done at all. They can't bribe a teller because the bank has only one of two keys for my box--when I've forgotten my key, I'm SOL.
This is what Schneier means by system security. Insisting on me using a booth is like upgrading your encryption when users are writing their passwords on stickies attached to their monitors.
Re:An example (Score:1)
Isn't that the truth. Years ago a place I worked had a machine on the DMZ script-kiddied. One of my bosses then insisted that we set up a password policy on the win2k domain behind the firewall (which was unaffected by the incident, that's the whole point of a DMZ). The password policy required "strong" passwords - varying case, numbers, puntuation, minumum length..
Ummm (Score:2, Insightful)
Re:Ummm (Score:1)
My associates Mr. Smith and Mr. Wesson will be pleased to make the acquaintance of that someone. Actually, I conceal carry a .45 ACP manufactured by a company called Kimber, but few Slashdotter's would recognize that name. I'm one of the principals of the company, so carrying concealed at the office is condoned.
Re:Ummm (Score:1)
So, someone wanting your data badly enough to take it by force can still take it. But you've ensured that they have to kill you in the bargain. Good thinking.
Re:Ummm (Score:1)
If your data is that sensitive that you can conceive of someone killing to get at it, you hire pros to transport it. There are professional courier services that work with this kind of risk, though they are expensive. Otherwise, life is full of risk, deal with it and move on or continue to cower and whimper on your knees.
Re:Ummm (Score:1)
Without disputing your right to have a loaded firearm about your person, I don't think it's a very smart way to mitigate the risk of someone stealing your data; or a very smart way to mitigate almost any risk for that matter. Unless you're in law enforcement or the army, the risk from being armed (accident, escalation of otherwise non-fatal assault, etc.) far outweighs the very small chance that being armed will actually be helpful.
I understand
Re:Ummm (Score:1)
Carrying concealed is allowed in select states in the United States [packing.org], provided an individual goes through a licensing process that is renewed every few years. Very irritating that we have to ask the Leviathan Government permission to defend ourselves, but a minor nit compared with some of the grosser violations of our freedoms that are more important to roll back.
Re:Ummm (Score:2)
You're sort of right, but not really due to the particular circumstances. The bank is a ten minute drive through a semi-rural/industrial setting, down major roads with lots of cops who don't have much to do. A carjacking is unlikely in the extreme.
Also, there's just the fact that, since we're a manufacturer of commodity housewares, where industrial espionage itself isn't terribly useful, the risk of an at
Okay.. but you are getting off topic. (Score:1)
That doesn't change the fact that you are the weak link.
Also, the bank manager has a very good, and valid, point. Wheras you see convenience, he sees the possibility of a complaint down the road, and heck, bank protocol wasn't followed; the employees had information they should not have, which makes them more suspect.
Re:Okay.. but you are getting off topic. (Score:2)
My point a
Re:An example (Score:3, Insightful)
Or like most banks' online transactions, which are encrypted by the maximum key length supported by non-export browsers, but makes no attempt to make its users use high-entropy passwords to access that encrypted data. My own bank just uses my ATM PIN, which only has 10,000 possible values!
Most security measures serve to make people feel more secure, not make them
PIn is safe. (Score:1)
You don't need a high entropy password if it's not possible to brute-force against the system.
Many banks insist that they KNOW what is in a safe deposit box, so you don't put, say, things that could explode, or start a fire, in them. That's not to s
Without even reading the article ... (Score:2)
"Technological solutions don't work for human problems. 9/11, Bush, P2P vs. RIAA are human problems. Cryptography can't help you here either, so look elsewhere. "
Just a hunch.
Re:Without even reading the article ... (Score:2)
The thing is, he's right. And he's determined to get his point across, so he's going to keep saying it until people start listening.
CSO has a magazine? (Score:1)
(No, I didn't RTFA. Why do you ask?)
Re:stupidsecurity.com has been slashdotted! (Score:2)
FleshNet (Score:1)
FLESHNET
CSO? (Score:2)
Aren't they the people who are trying to stamp out Lniux with a bunch of frivolous lwasuits?
Dyslexic lawyers of the world, untie!