lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed May  3 06:52:06 2006
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: What is wrong with schools these days? 

On Sun, 30 Apr 2006 20:16:27 EDT, "Gaddis, Jeremy L." said:
> While this often holds true, there should always a central infosec 
> department that has the ability to kill a switch port.  Kill the network 
> connection to a critical server exposing private information and people 
> take notice pretty quick.

It's the rare university indeed where all the copper in all the departments
is owned by one networking group that has the clue to manage it all.

The biggest info leakage problem usually *isn't* a "critical server", it's
some administrative staffer who's got an extract from some database sitting
in a folder on their hard drive so they can beat the snot out of it with
Excel and get a pretty graph for some PHB - and said staffer is blissfully
unaware that C$: is shared to the entire world....

And sometimes, even when you turn off the link on their RJ-45 and call them
to tell them there's a problem, it's hard to get their attention.  Remember
that they are *not* paid to be computer security wizards, and *you* are
interfering with *their* report being completed on time.....

It's *particularly* hard to get their attention when the PHB is the University
Vice President of <Foo>, and said PHB needs the pretty graph to present to
some accreditation committee that's visiting the campus in 3 days...

(And you over in corporate-land quit snickering - I'm sure that you have
VPs that have emergency reports that need to be finished because the audit
team from one of the Big-Used-To-Be-5 is arriving later this week....)

> Agreed, though lack of a response doesn't mean nothing is happening. 
> Often times, the first time infosec must do is contact legal for advice. 
>   Legal's first advice is often to simply not respond.

Quite often (especially if it's a dorm resident's personal machine), we're
restricted by FERPA issues (basically, if it remotely smells like a student's
records - which it becomes once we turn it over to the student judicial office).

As a result, we're often unable to say much more than "We got your report,
and it will be dealt with as per our policies.  Let us know if there's any
continued trouble".
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060503/7648233f/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ