With regard to IT security, what is sometyhing that currently cannot be done but if it could it would make things better/easier/more secure etc.?
Announcement
Collapse
No announcement yet.
Security
Collapse
This topic is closed.
X
X
-
Re: Security
Originally posted by Moenapper
With regard to IT security, what is sometyhing that currently cannot be done but if it could it would make things better/easier/more secure etc.?
realize that better cannot be easier, and easier cannot be more secure... :) That is paradigmatic...
In the gist of all things this is what the world really needs:
Given: Misconfigurations and Buffer Overflows account for most usages for exploits on vulnerabilities.
1. Teaching end users how to RTFM
2. Teaching admins how to RTFM.
3. Teaching programmers/SE's how to write/design secure code.
.
.
.
... and equally important ...
x. Applying 1, 2, 3, ... x.
-
Originally posted by 0versight
Make it a standard that everything must include some type of encryption would be a good idea. You CAN do it yourself, but the common general public do not do this, and what I mean by common public, people who aren't deeply interested in computers like us.
Moenapper didn't mention what type of involvement they were looking at... :) I would imagine they are thinking of something a lot simpler to research, generate, create, and standardize...
Comment
-
Re: Re: Security
Originally posted by Moenapper
I'm sorry I should be a little more careful how I word things.
I'm interested in what thoughts the participants of this forum have for new security ideas.
Anyone??
or does your boss expect a network admin to be able to say more than "the bliknking hard drive light is good,.....i think....."the fresh prince of 1337
To learn how to hack; submit your request
Comment
-
Originally posted by 0versight
I guess the biggest threat is a Keylogger.
http://keystroke-loggers.staticusers...re-keykatcher/
are pretty difficult to detect since they rely entirely on hardware... and looks like some type of adapter (while other models are complete keyboard replacements)... there are only a few techniques that involve testing nanoseconds of time and impedance... but 99.9% of the keylogger detection out there relies on checking for standard and undocumented software hooks for software keyloggers...
Comment
-
to be slightly more on-topic... I think there will be an increase in wifi security news.. shit hitting the fan so to speak. not necessarily the warnings that wardrivers have given, but the reason why the warnings were made last year. I think the time for awareness has passed for the most part, although I'm sure a lot of the new kids stocking up on fuckin pringles will be jumpy to hit any media coverage they can
my mind keeps thinking towards some major sec issues around PS/XBox type game systems... the mixture of growing broadband and the huge push for online gaming will come to a head with the highlighting of poor coding, imo.if it gets me nowhere, I'll go there proud; and I'm gonna go there free.
Comment
-
Originally posted by 0versight
Make it a standard that everything must include some type of encryption would be a good idea. You CAN do it yourself, but the common general public do not do this, and what I mean by common public, people who aren't deeply interested in computers like us.
ok maybe not quite the same
--simple3
Comment
-
Relax Kelvin.....
Just looking to post a topic that would stimulate interesting dialog.
Don't worry you are not doing someone else's work!
Back to the topic at hand, I agree with C0nv3r9 I think security is going to converge in the WiFi sector.
Specifically, perhaps a WiFi protected Access standard?
Comment
-
resistance is futile
the reasons wifi is insecure:- there are no visual boundaries (not out of the box)
most people do not rtfm.
most people do not apply if they did rtfm.
it is most difficult to control what you can't see what you are sending and who you are sending it to.
... on top of the already underlying security that WLANS, WAPS use such as Remote Access Dialin User Service (RADIUS) and implementations of RADIUS, in store for 802.11i is the temporal key integrity protocol (TKIP), and the Advanced Encryption Standard (AES) protocol.
... you can throw all the crypto you want at it, someone will be able to punch a hole due to some vulnerability in who it was written, what had been forgotten, what had been undocumented, etc... it isn't the crypto that people need to worry about, it is the application of the crypto that will fuck the most perfect transaction.
Without following my initial comments there can be nothing created that will not be broken almost as soon as it is out in the wild. This is why tranparency must exist, and this puts most of the work on the hardware and the design and engineering of the security widget... which puts pressure on those who end up writing the code, and making sure that it is checking for buffer overflows, throwing the correct exceptions, avoiding undocumented features, etc.
you can think up of a few hundred things to make in a good brainstorming session but without thinking them all the way through they would all be worthless by the time they left the door.
Comment
- there are no visual boundaries (not out of the box)
-
Originally posted by 0versight
Thats true, but maybe a few groups that should give their opinions are, @stake, CdC, and the like.....
@stake... At least they make *some* effort. I do miss the l0pht, though. A lot of good stuff came out of them.Last edited by skroo; February 1, 2003, 16:12.
Comment
Comment