2006/6/19, R. B. Riddick <[EMAIL PROTECTED]>:
But if a bad guy has already root access it does not really matter,
(aa) if he has to wait for some minutes or hours,
or
(bb) if he has just a small time window
or
(cc) if he can immediately start with scanning for secrets in /dev/mem.

I would argue about this. Allowing an intrunder to deal with your
system even one extra minute may lead to tremendous losses depending
on what kind of data your system operates with.
As Dan mentioned, the cost of data defines means of security you
should use to protect it.

As for standards, they are Russian national governmental ones appliyng
to computer systems that operate confidential, secret and more
sensitive data.
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to