Liste des Groupes | Revenir à se design |
On 12/12/2024 6:31 PM, Edward Rawde wrote:"Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjg0hu$310fn$2@dont-email.me...>On 12/12/2024 4:50 PM, Edward Rawde wrote:>"Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjfobk$2vgfa$1@dont-email.me...Once you are inside a perimeter defense, you can poke at machinesOn 12/12/2024 2:31 PM, Joe Gwinn wrote:
at your leisure and accumulate results, sharing them with your
external "accomplice" as need be for further refinement and instruction.
>
Imagine Joe Super Hacker having a network drop in your spare
bedroom. Do you KNOW hat he is there? Can you anticipate EVERYTHING
that he will attempt? Can you lock down the data that he steals before
it gets out past your firewall?
>
[If so, then why do so many "professional organizations" have problems
doing this?]
One reason might be because the organization does not employ anyone whose job it is to watch the firewall logs (using log
analysis
scripts as needed) in such a way that they can get familiar with what is usual and detect anything unusual.
Let's take a hospital with myriad networked devices on various networks.
Is anyone watching what goes in and out of the firewall like the security people are watching cameras and people activity?
Or has the IT equipment and firewalls etc been installed and left to run without any monitoring?
Organizations (like hospitals) typically have SCORES of IT folks.
In addition to out-sourced "specialists".
>
Banks and other groups with obvious financial exposure to such
losses likely considerably more. Governments? Firms involved
with that sort of technology?
Les messages affichés proviennent d'usenet.