Intrusion Detection Systems mailing list archives
RE: Pricing Intrusions
From: Jim.Meritt () wang com (Meritt, Jim)
Date: Thu, 14 Oct 1999 09:49:16 -0400
And here John stresses the importance of a good backup policy, and adhering to it!
_______________________ ---------- From: JohnNicholson () aol com[SMTP:JohnNicholson () aol com] Sent: Wednesday, October 13, 1999 3:05 PM To: ids () uow edu au Subject: Re: IDS: Pricing Intrusions
[snip]
There's also one area that you didn't address, which is the value of destroyed information. If you could get into a network and trash the information related to a valuable project, that could set a competitor back both in terms of time and money. _______________________ The opinions expressed above are my own. The facts simply are and belong to none. James W. Meritt, CISSP, CISA Senior Security Systems Engineer at Wang Global
Current thread:
- Re: Pricing intrusions Robert Graham (Oct 12)
- Re: Pricing intrusions Technical Incursion Countermeasures (Oct 13)
- <Possible follow-ups>
- Re: Pricing Intrusions JohnNicholson () aol com (Oct 13)
- Re: Pricing intrusions Marcus J. Ranum (Oct 13)
- RE: Pricing Intrusions Meritt, Jim (Oct 14)
- Re: Pricing intrusions Lister, Justin (Oct 14)
- Re: Re: Pricing intrusions Lister, Justin (Oct 14)
- RE: Pricing intrusions Lisbon (Oct 15)
