TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! ---------------------------------------------------------------------------- Well. Fortunately professional advisories bodies like Gartner and Gigaweb dont take the view that this rather ill considered article does. Any organisation embarking on a serious project would probably consult at least one of these first. I would suggest that it is written by someone who isnt really aware of current intrusion detection strategy. One of the authors wrote a book called "Hacking Exposed", which I suppose is interesting for a one time glance (i actually own it), but it is like the article, behind the times. ISS have published documents on dealing with switched networks in their resources on their website. Other IDS vendors, like Cisco, have a switch blade that integrates directly with the sensor. Stephen >>> <[EMAIL PROTECTED]> 13/12/00 22:00:24 >>> TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! ---------------------------------------------------------------------------- another interesting article that is more accurate: ---------------------------------------------------------------------------- I think this is media whoring in it's worst form making a dramatic statement such as "NIDS is dead" in order to achieve publicity - by replying I guess I'm as guilty :o) Any true security professional realises that IDS, firewalls etc are not a security panacea, we know that they have their faults but at least they are a step in the right direction, combining all the tools together, will go a long way to fill the gaps highlighted by Stuart and Joel by that I mean firewalls, Host IDS, Network IDS, personal firewalls, file integrity checkers etc. As for switched networks do firms with a security presence buy switches incapable of port mirroring, there are also shomiti taps that can go some way to counter the problems with switching Most scary is that the article may be read by unknowing individuals looking to embark on the road to securing their networks Maybe Joel and Stuart are about to release another book about hacking and need the publicity, surely with their experience they realise they are talking from orifices other than their mouths Deep Breath Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo [EMAIL PROTECTED] The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Tuesday, December 12, 2000 2:06 PM Subject: NIDS > > TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to > [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! > -------------------------------------------------------------------------- -- > > Just in case you all haven't heard the latest. Apparently we can all pack > up our bags and break down our NIDS because it doesn't work anymore. I had > no idea my job was useless :-) > > Here's the link to this fine article... > > http://www.infoworld.com/articles/op/xml/00/12/11/001211opswatch.xml > > > --Chris > > > > > ------------------------- My PGP key may be found at pgpkeys.mit.edu A computer lets you make more mistakes faster than any invention in human history, with the possible exception of handguns and tequila ---Mitch Ratcliffe, Technology Review, 1992 DISCLAIMER: Any e-mail messages from the Bank for International Settlements are sent in good faith, but shall not be binding nor construed as constituting any obligation on the part of the Bank. CONFIDENTIALITY NOTICE: This e-mail contains confidential information, which is intended only for the use of the recipient(s) named above. If you have received this communication in error, please notify the sender immediately via e-mail and return the entire message. Thank you for your assistance.
