Home page logo
/

basics logo Security Basics mailing list archives

Re: Securing workstations from IT guys
From: James Alcasid <james.alcasid () va gov>
Date: Wed, 28 Nov 2007 12:52:07 -0500

I agree Nick there are better ways to conduct security audits that are less
overtly intrusive. Imagine if a keylogging device was compromised what the
legal ramifications of such would be or how the data can be manipulated.

It appears as if in this firm there is ZERO IT Governance, basically all IT
access controls, methodologies, conventions and such are black box
operations. IT says all of their personnel need 100% access to all systems
and that is the way that it is and that is not really the case in most
situations.

I still stand by the assertion that a infoSec officer position needs to be
created that would have some oversight on these security issues that are
getting out of hand. Offer letters and salaries are getting compromised
because of excessive access. First and foremost before any kind of
technology implementation is in place there needs to be a policy and signoff
by the IT department on security compliance.


--

James Alcasid | VTI




From: Nick Vaernhoej <nick.vaernhoej () capitalcardservices com>
Date: Tue, 27 Nov 2007 18:41:27 -0600
To: security-basics <security-basics () securityfocus com>
Conversation: Securing workstations from IT guys
Subject: RE: Securing workstations from IT guys
Resent-From: <security-basics-return-46636 () securityfocus com>
Resent-Date: Wed, 28 Nov 2007 08:38:45 -0700 (MST)

A key logger? At what point are we crossing the line of common decency
towards co-workers?
I realize it is company property and all, but if you log access to
sensitive files and audit these logs do you really need to be more
intrusive?

This is not an attack, more a tagged on question to everyone?
Is keystroke logging commonly accepted by you?

Nick Vaernhoej
"Quidquid latine dictum sit, altum sonatur."


-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Vandenberg, Robert
Sent: Tuesday, November 27, 2007 11:18 AM
To: security-basics
Subject: RE: Securing workstations from IT guys


Those are good points.

I would recommend that you put in a keystroke logger program with the
written approval of your upper management on the PCs in question and
then download the logs each day.  That way you are able to create a
forensics "e-Trail" that can be used to confront/counsel/etc. them.  I
would also make sure that you look at your documenation and ensure that
each IT person has signed a document stating that they will not use
their abilities improperly.  Combine those two and you have a means of
pursuing them legally.


This electronic transmission is intended for the addressee (s) named above. It
contains information that is privileged, confidential, or otherwise protected
from use and disclosure. If you are not the intended recipient you are hereby
notified that any review, disclosure, copy, or dissemination of this
transmission or the taking of any action in reliance on its contents, or other
use is strictly prohibited. If you have received this transmission in error,
please notify the sender that this message was received in error and then
delete this message.
Thank you.


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]