TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

Well. Fortunately professional advisories bodies like Gartner and Gigaweb dont take 
the view that this rather ill considered article does. Any organisation embarking on a 
serious project would probably consult at least one of these first.

I would suggest that it is written by someone who isnt really aware of current 
intrusion detection strategy. One of the authors wrote a book called "Hacking 
Exposed", which I suppose is interesting for a one time glance (i actually own it), 
but it is like the article, behind the times.

ISS have published documents on dealing with switched networks in their resources on 
their website.

Other IDS vendors, like Cisco, have a switch blade that integrates directly with the 
sensor.

Stephen

>>> <[EMAIL PROTECTED]> 13/12/00 22:00:24 >>>

TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

another interesting article that is more accurate:
----------------------------------------------------------------------------

I think this is media whoring in it's worst form making a dramatic statement
such as "NIDS is dead" in order to achieve publicity - by replying I guess
I'm as guilty  :o)

Any true security professional realises that IDS, firewalls etc are not a
security panacea, we know that they have their faults but at least they are
a step in the right direction, combining all the tools together, will go a
long way to fill the gaps highlighted by Stuart and Joel by that I mean
firewalls, Host IDS, Network IDS, personal firewalls, file integrity
checkers etc.  As for switched networks do firms with a security presence
buy switches incapable of port mirroring, there are also shomiti taps that
can go some way to counter the problems with switching

Most scary is that the article may be read by unknowing individuals looking
to embark on the road to securing their networks

Maybe Joel and Stuart are about to release another book about hacking and
need the publicity, surely with their experience they realise they are
talking from orifices other than their mouths

Deep Breath
Andy
http://www.networkintrusion.co.uk 
Talisker's Network Security Tools List
                    '''
                 (0 0)
  ----oOO----(_)----------
  | The geek shall        |
  |  Inherit the earth     |
  -----------------oOO----
               |__|__|
                  || ||
              ooO Ooo
[EMAIL PROTECTED] 

The opinions contained within this transmission are entirely my own, and do
not necessarily reflect those of my employer.





----- Original Message -----
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, December 12, 2000 2:06 PM
Subject: NIDS


>
> TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message
to
> [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any
problems!
> --------------------------------------------------------------------------
--
>
> Just in case you all haven't heard the latest. Apparently we can all pack
> up our bags and break down our NIDS because it doesn't work anymore. I had
> no idea my job was useless :-)
>
>  Here's the link to this fine article...
>
> http://www.infoworld.com/articles/op/xml/00/12/11/001211opswatch.xml 
>
>
> --Chris
>
>
>
>
>




-------------------------
My PGP key may be found at pgpkeys.mit.edu

A computer lets you make more mistakes faster than any invention in human
history, with the possible exception of handguns and tequila

---Mitch Ratcliffe,
   Technology Review, 1992





DISCLAIMER: Any e-mail messages from the Bank for International Settlements are sent 
in good faith, but shall not be binding nor construed as constituting any obligation 
on the part of the Bank.

CONFIDENTIALITY NOTICE: This e-mail contains confidential information, which is 
intended only for the use of the recipient(s) named above. If you have received this 
communication in error, please notify the sender immediately via e-mail and return the 
entire message. Thank you for your assistance.


Reply via email to