From: "Tracy R Reed" <[EMAIL PROTECTED]>
I have been hanging out on the sdw2003 mailing list recently to get an
idea of how the other half lives. It's a bit like going to explore a
strange foreign country and getting culture shock. One area where I
suspect we differ is in the area of security. I would like a few KPLUGgers
to review this thread and give me their opinion on how they would have
advised the original poster:
I read a total of 5 pages, the links from both 2 emails. Did I miss one? or
more?
First thing first. This hints of either one of two things, someone
inexperienced wondering what would happen if .... or someone who is way over
their heads. The last hint of speaking to someone off list seems to me like
something got fixed.
In any event a police report should have been filed, depending on the data,
the police will be investigating you further to some end info about the data
is needed to decide what is important and what is not, the police are also
well equipped to give you info on how to continue depending on the data,
insurance companies are also a good source of who to call in any case.
From what I read your questions stand, the magic "safe" could have been
anything and anywhere, a set of scenarios: if the safe was in a retail
environment one could have stolen the safe for the thought that it had paper
money in it. In this case the chance that any attempt to decrypt the data
would seem slim at best. However if that same safe was say in a medical
center where money would be less likely, then they had better be notifying
someone depending on where they are. Some info about the safe would have
been appropriate to be shared. However to add a twist to that, you do have
to be careful who you say what to when your dealing with an incident which
may or will lead to a trial.
The posters dismissal of the employees seems at first odd, but that's info I
can see not posting. It might be a smart employee who knows or thinks that
real good logging is taking place, stealing the safe might be the next best
thing, and a found fingerprint means nothing, anyone can hire a Gump to
steal for your.
the note about not knowing what software was used is bogus, completely
bogus, its just too easy to tell, and to decrypt to some readable state vs.
an executable state IE recover some data on a backup vs. use the entire
backup to replace what was on the computer requires different amounts of
work.
Richard Reynolds
[EMAIL PROTECTED]
--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list