A structured threat is a threat from someone who has experience and knowledge as far as breaking into networks. An unstructured threat is a threat by a script kiddie. I guess they use structured because a knowledgeable black-hat would have a comprehensive plan on the attack, whereas an unstructured threat would just be looking for the latest Microsoft bug ;-)
Fred Reimer - CCNA Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338 Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050 NOTICE; This email contains confidential or proprietary information which may be legally privileged. It is intended only for the named recipient(s). If an addressing or transmission error has misdirected the email, please notify the author by replying to this message. If you are not the named recipient, you are not authorized to use, disclose, distribute, copy, print or rely on this email, and should immediately delete it from your computer. -----Original Message----- From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED] Sent: Monday, August 25, 2003 1:46 PM To: [EMAIL PROTECTED] Subject: RE: SAFE and the Holy Hand Grenade of Antioch [7:74304] Reimer, Fred wrote: > > Structured > Unstructured > Internal > External What is a structured versus unstrucuted security threat? There sure are a lot of "unstructured" ones going on right now. Anyone else seeing a huge increase in pings? I guess it's the welchia virus. It's getting ugly. And the amount of spam from sobig is really astounding. Perhaps we need a more structured way of allowing clueless users to get on the Internet. Maybe ISPs that don't provide personal firewalls and anti-virus software for their end users should be disallowed somehow. (I'm thinking that most of the problems are coming from clueless home and small business users, not enterprise networks, where things are more "structured," hopefully.) Priscilla > > It's covered in every training course I've taken so far on my > way to CCSP. > CSVPN covers it, SECUR covers it, CSI covers it, I believe > CSPFA covers it, > and CSIDS probably covers it. > > Joshua covered the four remote-access types nicely... > > Fred Reimer - CCNA > > Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA > 30338 > Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050 > > NOTICE; This email contains confidential or proprietary > information which > may be legally privileged. It is intended only for the named > recipient(s). > If an addressing or transmission error has misdirected the > email, please > notify the author by replying to this message. If you are not > the named > recipient, you are not authorized to use, disclose, distribute, > copy, print > or rely on this email, and should immediately delete it from > your computer. > > > -----Original Message----- > From: Marko Milivojevic [mailto:[EMAIL PROTECTED] > Sent: Sunday, August 24, 2003 8:29 PM > To: [EMAIL PROTECTED] > Subject: Re: SAFE and the Holy Hand Grenade of Antioch [7:74304] > > > Yet when I go through the SAFE documentation, I find: > > 7 Axioms of types of targets (p. 5 of PDF) > > 3 Types of Expected Threats (p. 10) > > 3 separate validation services for remote user access > (p. 30) > > 12 elements of the taxonomy of network attacks (p. 56), > some of > > which are actually host attacks. > > > > No number that is four. > > Uhm, this is 4-items list... ;-) > > > Marko. > **Please support GroupStudy by purchasing from the GroupStudy > Store: > http://shop.groupstudy.com > FAQ, list archives, and subscription info: > http://www.groupstudy.com/list/cisco.html **Please support GroupStudy by purchasing from the GroupStudy Store: http://shop.groupstudy.com FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=74351&t=74304 -------------------------------------------------- **Please support GroupStudy by purchasing from the GroupStudy Store: http://shop.groupstudy.com FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html