• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!

An eye opening lesson in IT security

Collapse
X
  •  
  • Filter
  • Time
  • Show
Clear All
new posts

    #11
    Originally posted by doodab View Post
    At that scale I'd guess they would be more concerned with who talks to whom and how often, who looks at which suspicious websites and what they looked at (can be inferred from response sizes) and looking for patterns, perhaps even working out where someone is physically located if they don't already know.
    Probably still plenty of crims and terrorists who haven't figured out how to use tor.

    Like these ones: http://www.nytimes.com/2013/05/10/ny...anted=all&_r=0
    "A life, Jimmy, you know what that is? It’s the s*** that happens while you’re waiting for moments that never come." -- Lester Freamon

    Comment


      #12
      Originally posted by Freamon View Post
      Probably still plenty of crims and terrorists who haven't figured out how to use tor.

      Like these ones: http://www.nytimes.com/2013/05/10/ny...anted=all&_r=0
      I'd guess that any traffic going to or from a tor node would be considered interesting by nature, not to mention they could flag the fact that someone was using tor in the first place.
      While you're waiting, read the free novel we sent you. It's a Spanish story about a guy named 'Manual.'

      Comment


        #13
        Originally posted by NotAllThere View Post
        If you work for a large well known company, have a chat sometime with the network security team.
        They vary a lot, I do a bit of expert witness work in the area of "how the hell did this tulip get to where it is now and who do be blame then sue ?"

        I get to talk to in-house security at large firms, some of which are household names and their security varies from the impressive to the tragic.

        I've just done a piece of trends in the job market for TheRegister.com and a corollary to my understanding of the way top management want security to work is that the number of holes will increase.

        In the good old days like 2010 you had servers which you defended with dogs and guns, PCs which you never really trusted and some vaguely rigorous of assignment of access to various grades and type of users.

        The web made relatively little difference to this, web servers were designed to give specific access to outside end users who had simple well defined access rights.

        Note I say "designed to", we can all share cases where design did not equal implementation.


        Now, the fashion is to give "partners" more access to internal data (ie letting suppliers see your stock levels, customers see more about order processing, etc up to and including API access to the core databases of corporate systems.

        In other words "the business" part of firms, including household names wants to give access rights to outsiders that previously wasn't freely given to internal staff.

        None of that is impossible, nor is it hard.

        What is hard is doing it right and knowing that you've done it right.

        That's why it's on my "learn this crap to get more money" list, since it ticks all the boxes of a skill to get on your CV, demand from the people who control the money, visible productivity, lots of different systems to make work together, and needs a lot of work to get right.
        My 12 year old is walking 26 miles for Cardiac Risk in the Young, you can sponsor him here

        Comment


          #14
          The chaps I have been working with were of the opinion that most companies take months not weeks to find an exploit. Thats before they even deal with the consequences. If you own IP that defines your business, then months is a long time for a guy to be file dumping your servers.

          As for knowing your stuff: The unfortunate trend to finding the cheapest guy for the job has made matters worse I got to a point where rockstar server admin skills were worth nothing compared to writing a pointless doc and watching some newb completely mangle your design with slap dash wide open OS installs and rhost files full of trust all...

          Add into the chaos poorly written code by guys that don't get what they are doing it becomes easy pickings...

          I am yet to meet a security team that actually understand what they are supposed to do. For the most they are firewall managers at best

          Comment


            #15
            The security team I chatted with were one who told the CIO to f*** off when he wanted to get everyone to use dropbox to share sensitive data. They suggested that cutting out the middle man and posting directly to wikileaks would save a lot of effort.

            Anyone developed paranoidlinux yet?
            Down with racism. Long live miscegenation!

            Comment


              #16
              Originally posted by NotAllThere View Post
              The security team I chatted with were one who told the CIO to f*** off when he wanted to get everyone to use dropbox to share sensitive data. They suggested that cutting out the middle man and posting directly to wikileaks would save a lot of effort.
              That of course is why IT people get outsourced.

              The CIO wants to do some crɑp like this and gets stopped, so he hires some "security consultants" from one of the big accountancy firms, or worse still Capita or whatever who charge a packet and then either tell him what he wants to hear or sell a "solution" that is even less secure.

              A big problem with security is that for any given hole, the worst usually does not happen.

              So that means he can pull this stunt several times, in-house security say "no", the consultants demonstrate a "can-do business attitude" and one day you come in and find you have a new employer, or that you're out of work and been replaced by some UK based frontmen backed up by Indians.

              However you may feel that as a hybrid headhunter/journalist that I am by nature too cynical.
              My 12 year old is walking 26 miles for Cardiac Risk in the Young, you can sponsor him here

              Comment


                #17
                Originally posted by Dominic Connor View Post
                ..., or worse still Capita
                Crapita.

                However you may feel that as a hybrid headhunter/journalist that I am by nature too cynical.
                I doubt it. Possibly not cynical enough.

                Yes, the security team could get outsourced, but that can be a good thing. The ex-employees then set up their own company and charge $$$$$ per day to fix the problems the outsourcers have set up - I've known this to happen.

                In this case though, the security team reported to group security... not the CIO. The organisation takes security very seriously. Not quite board presence, but very close.
                Down with racism. Long live miscegenation!

                Comment


                  #18
                  Originally posted by OwlHoot View Post
                  WHS, but this obsession with logging IT comms by that bossy Home Secretary (I forget her name) has very little to do with terrorism but is much more about identifying council house and housing association sub-letters and cash-in-hand landlords, to try and winkle more tax out of them.
                  As I was saying:

                  Forget the spies: councils want the Snooper's Charter, too » Spectator Blogs

                  http://blogs.spectator.co.uk/coffeeh...rotect-people/

                  From the latter page:

                  A Freedom of Information request recently carried out by the organisation Big Brother Watch highlighted the large number of public authorities clamouring to get their hands on this vast mine of data. They included those who I would rightly expect to have access such as the Serious Fraud Office; to those who I cannot understand why they would ever need access – such as the Royal Mail, the Health and Safety Executive and the Charity Commission.

                  I have even received representations from my own Local Authority, Enfield Council – calling on me to support the Cabinet Member for Environment’s wish to be granted access to communications data once the redrafted Bill comes back to Parliament.

                  Given the numerous examples of local authorities using already existing surveillance powers in manners for which they were never intended – such as to catch those living outside school catchment areas or monitoring the illegal movement of pigs – why on earth would they also need access to their residents’ communications data?
                  Last edited by OwlHoot; 13 June 2013, 17:06.
                  Work in the public sector? Read the IR35 FAQ here

                  Comment


                    #19
                    It's worse than that...

                    Some years ago I was asked to provide some support for Eurim (big IT industry lobbying group) about the dangers of the ever increasing set of government who could using spying powers and tech.

                    One serious issue is Sinn Fein, or any other bunch of nutters you feel are beyond the pale.

                    They already run bits of government through free and fair elections. The day is coming when the BNP does as well.

                    Those are just the nutters who are officially members, random crazies are to be found at least as much in local government as anywhere else.

                    The test for any power needs to be "what if they other guy gets this power ?"

                    You may like Cameron and Clegg, any power you give them will end up with whoever takes over Labour from Milliband, or the next Thatcher or the next Blair or the next Enoch Powell...
                    My 12 year old is walking 26 miles for Cardiac Risk in the Young, you can sponsor him here

                    Comment


                      #20
                      Originally posted by Dominic Connor View Post
                      Some years ago I was asked to provide some support for Eurim (big IT industry lobbying group) about the dangers of the ever increasing set of government who could using spying powers and tech.

                      One serious issue is Sinn Fein, or any other bunch of nutters you feel are beyond the pale.

                      They already run bits of government through free and fair elections. The day is coming when the BNP does as well.

                      Those are just the nutters who are officially members, random crazies are to be found at least as much in local government as anywhere else.

                      The test for any power needs to be "what if they other guy gets this power ?"

                      You may like Cameron and Clegg, any power you give them will end up with whoever takes over Labour from Milliband, or the next Thatcher or the next Blair or the next Enoch Powell...
                      Paranoid pish.

                      Comment

                      Working...
                      X