Guy,

I believe what he tried to say is the common thought that once you teach
people how to protect themselves - it becomes obsolete, as the hackers read
it too.

However - good security design is NOT one that is based on the ambiguity of
the solution, but rather on the design, and therefore - the fact you are
basing some or all of your design on known things, doens't nesc. mean that
it is obsolete model.

Ofer.


-----Original Message-----
From: guy keren <[EMAIL PROTECTED]>
To: Aviram Jenik <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
Date: יום שישי 04 פברואר 2000 03:14
Subject: security reality check (was: Re: Maximum Linux security)


>
>On Thu, 3 Feb 2000, Aviram Jenik wrote:
>
>> I read 'Maximum Security' by anonymous (I imagine the book you're talking
>> about is some kind of sequel). It was an excellent book, but keep in mind
>> that security books get old the moment they are released.
>       ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>i'd like to take a moment discussing this common saying...
>
>security knowledge or information should probably be split into 3
>different levels.
>
>the first level is fundamental issues regarding security policies. under
>this we could categorize things like the "exclude everything, then enable
>on a per-case basis" rule, the "if your system got compromized, you should
>wipe it up, re-install, and load from the last backup before the
>break-in". there is much more to this level, but it basically covers rules
>and policies that remain valid for a very long time (i wouldn't say
>forever), and that are relevant to different aspects of security (network
>security, host security, removeable media security, etc.)
>
>the second level would contain understanding general concepts and
>algorithms that are not specific to a particular product. things such as
>"public key cryptography", "packet filtering", "digital signatures",
>"untrusted client - trusted server" and the like would fit here. these
>techniques and algorithms tend to remain in use for several years, and are
>implemented in a wide range of products.
>
>the third level would cover security specific products and systems. the
>info here could be long lived (when the given product stays in use for a
>long time, and does not change much), or short lived (a product is
>replaced by a new one with a completely different configuration, or by a
>newer version that changes lots of features).
>
>when you read commonly sold books about security, they seem to tend to be
>"practical" - they concentrate more about securing specific systems,
>software products, and as such must delve to details that are relevant to
>specific software versions. if you try to educate yourself using such
>books, then (unless you manage to generalize the details into
>general policies and guidelines) your info is bound to become obsolete
>slowly (or quickly) but surely.
>
>if one actually has some patience, and decides to learn this subject
>properly, one should take the time to cover a book (or two) that deals
>with the first level, then look out for books that discuss various issues
>on the second level, and then developes a habbit of reading relevant books
>of the third level on a need-to-know basis, and replace those on a regular
>bases (even if only for using as a reference material).
>
>note that the order of reading these books does not have to be kept - it's
>quite valid and possible to change the order, or follow several paths in a
>mixed manner - in such a case, it is important to take the time every once
>in a while, sit back, and think of how all the info you gathered fits
>together into a larger picture.
>
>btw, you will notice that this approach is not unique to studying security
>- it is relevant to studying any broad issue, that either changes rapidly,
>or that your area of concentration changes rapidly.
>
>guy
>
>"For world domination - press 1,
> or dial 0, and please hold, for the creator." -- nob o. dy
>
>p.s. there is a 4th level - reading bugtrack/cert/.. advisories on a daily
>     basis...
>
>
>=================================================================
>To unsubscribe, send mail to [EMAIL PROTECTED] with
>the word "unsubscribe" in the message body, e.g., run the command
>echo unsubscribe | mail [EMAIL PROTECTED]
>
>


=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to