Timothy J. Miller wrote:
Roy Keene (Contractor) wrote:
CAC in a Personal (i.e., potentially not managed by someone who meets DISA requirements for a system administrator, and on a network that follows DISA guidelines to mitigate risk) machine mostly defeats the purpose of it.

That's a hell of a claim.  Care to back it up?

-- Tim


------------------------------------------------------------------------

_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle

Once you give the process your PIN, it can modify the data however it wishes before passing it to the CAC to be signed/encrypted.

Thus if your workstation is in a significantly increased position of risk (i.e., you do not apply security patches, and are not on a network that blocks known-bad attackers, and there is no IDS/IPS) then any e-mail you send is at a significantly increased risk of being tampered with, and any encrypted transmission are at a significantly increased risk of being intercepted with.

The purpose of CAC is to provide relatively secure transmission and verification of data. To achieve this, DISA has guidelines to mitigate risk and decrease the risk of a workstation being compromised without detection.

Certainly, it still happens on a network that follows DISA guidelines, but it happens very infrequently and is almost always detected.

--
        Roy Keene (Contractor)
        Office of Network Management (Code 7030.8)
        Naval Research Laboratory
        Stennis Space Center, MS 39529
        DSN 828-4827

_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle

Reply via email to