On 06/13/2013 01:03 PM, Brandon Allbery wrote:
On Thu, Jun 13, 2013 at 5:39 PM, Harvey Rothenberg <forensic2...@yahoo.com <mailto:forensic2...@yahoo.com>> wrote:

    From TechTarget's WhatIs (dot) com defines a worm as a
    self-replicating code that does not alter files but resides in
    active memory and duplicates itself. It is common for worms to be
    noticed ONLY when their uncontrolled replication consumes system
    resources, slowing or halting other tasks.


That ship has sailed. Like it or not, the average user --- and the average compliance auditor --- does not distinguish between clades of malware.
I'm a slow learner at times. For years I've been arguing with our compliance auditor about various aspects, and then finding out it gets me no where. I still end up having to do stupid pointless checks all over the place just to meet a tick box, and I'm never going to persuade them otherwise. When we interview sysadmin candidates one thing we tend to ask is "What aspect of a sysadmin job don't you like". For me it's become PCI-DSS / Security compliance, without question. I 'waste' at the very least a day, but more typically two, researching and confirming that 99% of the vulnerabilities reported for our infrastructure are false positives, and I have to do this every 3 months or so.

Like it or lump it our job is to somehow wrangle a cohesive and complete security infrastructure that incorporates that checklist, even if all it does is marginalise the harm caused by that checklist.

Paul
_______________________________________________
Discuss mailing list
Discuss@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to