--- Paul Robertson <[EMAIL PROTECTED]> wrote:
>On Fri, 18 Feb 2000, jeff andrews wrote:
>
>> So if you had three candidates for hire:
>> 1) Jack Smith, Security Professional, CISSP certified.  
>> 2) John Smith, ex-hacker turned security expert 
>> 3) Dr. Chaos, gray hat hacker in hacker group Anarchy4Life Club
>> 
>> Which one would you hire as VP of Security or senior security consultant lead of 
>the project to manage your security? Would it be in the 1, 2, 3 order?  From a trust 
>standpoint, it seems like it would be easier to trust Jack Smith (#1), and then John 
>Smith (#2), and how much you trust #2 depends on what kind of hacker was John Smith 
>previously.   How much do you trust and want to hire #3?  The above names are 
>intended as fictional characters for example only. 
>
>(D.) None of the above.

Excellent point.  Maybe I should add an additional step of checking the above 3 
candidates for technical competency first, and they all pass, who would you hire?  


>There are no hard and fast rules though.  I've met sysadmins of the {no 
>illegal acts, no cracking, no 31337 group} variety who told me I was
>positively moronic for not putting backdoors into systems I administered.

I would think backdoor-ing a system that is owned by the company without permission is 
an illegal act? Maybe I am missing the intent of the backdoor: is it just incase 
something goes wrong because several people have root password, and you may need to 
recover quickly in an emergency, or is it just incase you are fired, you can 
potentially get back at the company?
I am not a lawyer, but I would say that has good potential of being an issue.  

>
>It is important to point out that it's possible to be good at security
>without having a questionable background.  IP doesn't change depending on
>who's looking at it, and neither do OS'.
>
>There are a large number of very clueful black and gray hats out there
>(and not a large number of equally clued INFOSEC people.)  I'd rather they
>had fun and got money doing good things than bad.  It probably wouldn't be
>my money they'd get though.

There's this perception that there's a vast number of really talented gray and black 
hat hackers.  I would argue that this number is MUCH smaller (less than 100?) and that 
there is an equal number of good guys in security.  How many "Mudge" type people exist 
in the world?  You can start to count.. Mudge, Hobbit, Weld Pond, and the names and 
numbers dramatically decrease from there. On the flip side, we have Casper Dik, Wietse 
Venema, Steve Bellovin, Eugene Spafford, etc that are good infosec people who are just 
as much or more technically competent than gray hats, they just don�t post and brag 
about their exploits.

Despite this notion that there is a big number (1000�s?) of very technically talented 
black hats and gray hats floating around, my guess is anyone who really understands 
OSes, IP, and can write code is better off joining an Internet company and using their 
talent to become a millionare in stock options, rather than illegally hacking and 
posting exploits for free.   

The large number of gray hats and black hats are bordering on being script kiddies 
(I'm convinced of this based on the emails I've received on this subject), and with 
the recent hype on gray hats, it will only get worse with more technically incompetent 
people self-proclaiming to be gray hats and wanting to be hired.    

As security startups start to hire gray hats to fill the demand, my guess is they are 
facing a difficult time trying to hire decent talent.  They may fall into the big Six 
trap: there's one person who actually knows what they are doing, and that's who you 
initially deal with and hiring the team, and after they are hired, that one person 
spends like %5 of his or her time there and goes on to get more business, while a 
bunch of incompetent or more questionable gray hats try to complete the work. 

So back to my very original question, with the press and media hyping the gray hat 
model, will companies really hire gray hats?  As far as trust goes, how do you trust 
someone who won�t reveal their real name, but only their hacker handle and hacker 
group identification?   Will they check the background of these gray hats for 
technical competency?  

Is this gray hat model really a good business to go after, meaning will companies 
actually pay lots of money, and maybe more black hats should start up gray hat 
companies?  

 My guess is time will tell.

Thanks,

-- JA


Jeff Andrews,
Senior Security Engineer


_____________________________________________________________
Email Powered by Everyone.net
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to