"Devin L. Ganger" wrote:

> On Fri, May 25, 2001 at 02:13:14PM -0700, Eric Robinson wrote:
>
> > In an ideal world, I suppose we would have time to conduct an "exhaustive
> > forensic analysis" of each of the 9000+ effected systems.
>
> Nope.  That's where the risk analysis comes in.
>
> "How much risk will I be at, versus the amount of labor invested?"
>
> Full analysis + actions indicated: low risk, extremely high labor.
> No analysis, rebuild system: low risk, moderate labor.
> Light analysis, plug holes: unknown risk, low labor.

Agreed.

No one mentioned products like Tripwire and other similar tools to report
modified files to reduce the risk further, and also reduce the labour somewhat.


> > We plugged the hole and moved on. Twenty days later, still no apparent
> > problem or strange activity on the server. No exhaustive analysis performed.
> > No hard drive reformatted. No time wasted.
>
> This time.  Until the black hats get smarter than your instinct.

Yes, thats playing russian roullette :)

I still think good security management can increase your chances of recovering
a compromised system quicker and more effectively. (Assuming properly done)

Prevention is better than cure! <tm>



Regards,

Chris.

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to