mailing list archives
Re: [11:29:07 security.rc] RE: Where to start
From: Aschwin Wesselius <full-disclosure () illuminated nl>
Date: Wed, 10 Mar 2004 12:32:08 +0100
On Wed, 2004-03-10 at 06:17, Aditya, ALD [Aditya Lalit Deshmukh] wrote:
Does a good security-officer have to know everything about every hole? I
myself don't think so, but where do people start?
security officer is more of a complience officer, he makes sure that all the users, admin and other it staff stick
to the policies created.
I think this title is different in every company, just as system
adminstrator can also mean you have to do network adminstration. In The
Netherlands, where I live, job descriptions are growing pretty wild with
even more exotic titles while demanding hilarious combinations of skills
or certifications. But still they want young people with experience. Go
I want to learn more about security stuff, but I can't find the real
basics to build upon anywhere. When there are posts on lists they
presume that everybody has a certain knowledge level and are aware of
best practices. But is this true?
to start the basics some of the more experienced members of this list will point you out just the right sources but
take all the advice with a grain of salt.
I like to cross reference when I am in doubt of a subject or statement
from anybody. As soon as another source says something similar the doubt
decreases. Another one on this list stated to always test any findings
in your own environment and if different post the results back where
needed. This is off course the scientific approach.
Just because there are discussions, it seems that there is not one
overall and central way of keeping track of evolving issues. How do
people keep track easily with up to date best practices and not get
distracted by "old" advisory?
discussion is a good way to keep currunt and adapt your existing infrastructure for the latest threats
Jep, I do understand that one. But how is it realistic, to fight against
current or most recent threats and letting gaps exists wich where
discovered last year? Some people just step in today, but are not
completely aware of good old school tricks wich might still be appliable
or even exploitable in his/her very own network? Then, yes you keep
track of "popular" exploits, but are vulnerable for things real veteran
crackers come up with.
There should be some checklist to go trough with some chronology so you
can check your network or just your system against it. Or do those tools
available nowadays it for you? I think you can't depend on just simple
thinking that the most recent version of your software is patched
against old threats........
Anybody with a good insightful thought?
(I was told this list is not appropiate for discussions like this...
where to go? besides SecurityFocus where I've submitted myself to)
Full-Disclosure - We believe in it.