1) I think there is value in aligning with existing standards where
possible.  I'm not a SSCP, but I am a CISSP, and I think the CBK is a good
starting place, although overly broad to be immediately useful.  The
translation to the technical side is what needs to be done.

2) One problem with aligning to standards is that, as far as I can tell,
if you weren't the person who submitted the task, you can't edit it. 
Thus, every person who puts in tasks needs to enter their own reference
(ie, CBK-1).  OR, someone needs to go back retroactively to do it.

3) The list below is a good start - I think we just need to start plugging
them in and filling up the JTA database.  Many / some of them are already
in there.

I'd like personally to see high-level groups for some of the important
ones like Nessus, Apache, FTP, DNS, with sub tasks for each of them.  
Right now I think we are scattering such things under other umbrella
groups.  There'll need to be some reordering probably at some point.  I
guess this is normal :)

> Here's my suggestions (_not_ complete, comprehensive):
>
> Application Security:  Apache, FTP, DNS w/Auth, etc...
> Host Access Control:  TCP Wrappers, Sudo, DAC/MAC (as above)
> Host Local/Network Filesystems:  Ext3/XFS ACLs, NFS/Samba, AFS
> Host Auditing:  Syslog, Kernel (maybe 2.6-focused?), Select Add-ons
> Host/Net Filter:  NetFilter/IPTables, IPTable Modules
> Network Authentication:  Kerberos, LDAP-SASL
> Vunerability Scans:  nmap, Nessus, other "top 10/25" tools
> Host IDS:  Tripwire, other checksumming tools (one begins with "A",
> can't remember because I don't use it, but I should)
> Network IDS:  Snort, complementary tools, other "top 10/25" tools

_______________________________________________
lpi-examdev mailing list
[EMAIL PROTECTED]
http://list.lpi.org/mailman/listinfo/lpi-examdev

Reply via email to