Hey Lora,

I have a side bet going that you can help me with if you please.  Are you
really -sc?


 - WJR


On Tue, Aug 6, 2013 at 11:10 AM, Lora Cates <lora.ca...@rocketmail.com>wrote:

> I find it interesting that there are several folks, myself included, that
> fail to see your point, yet when pressed for details on specific points you
> reply with the deeply insightful "Whatev." and now declare the conversation
> ended so you are taking your ball and going home.
>
> Are you just unwilling to explain yourself, or unable?
>
> -lc
>
>
>
> > From: listsad...@lists.myitforum.com [mailto:listsadmin@lists.**
> myitforum.com <listsad...@lists.myitforum.com>]
> > On Behalf Of Micheal Espinola Jr
> > Sent: Monday, August 5, 2013 8:35 PM
> >
> >
> > To: ntsysadm@lists.myitforum.com
> > Subject: Re: [NTSysADM] man-in-the-middle attack
> >
> >
> >
> > I guess you either see my specific point or you don't.  I stated it, and
> I'm
> > not one to engage in arguments were I just repeat myself because people
> are
> > choosing to ignore, overlook, or simply disregard my point.  If you don't
> > agree, don't, and move on.  If you dont know what my "specifics" were,
> then
> > I dont know what to tell you - other than,  I guess reread the emails.
> >
> >
> >
> > In any event, I'm no longer interested in this topic of conversation,
> since
> > it stopped actually being one many replies back.
> >
> >
> > --
> > Espi
> >
> >
> >
> >
> >
> > On Mon, Aug 5, 2013 at 5:16 PM, Ken Schaefer <k...@kj.net.au> wrote:
> >
> > What are the characteristics of the “specifics” you’re referring to that
> > make a general analysis not applicable?
> >
> >
> >
> > I think this is the crux of the issue taken with your original post.
> >
> >
> >
> > Cheers
> >
> > Ken
> >
> >
> >
> > From: listsad...@lists.myitforum.com [mailto:listsadmin@lists.**
> myitforum.com <listsad...@lists.myitforum.com>]
> > On Behalf Of Micheal Espinola Jr
> > Sent: Saturday, 3 August 2013 5:00 AM
> >
> >
> > To: ntsysadm@lists.myitforum.com
> > Subject: Re: [NTSysADM] man-in-the-middle attack
> >
> >
> >
> > You're continuing to generalize, ignoring the specifics I was referring
> to.
> >
> >
> > --
> > Espi
> >
> >
> >
> >
> >
> > On Fri, Aug 2, 2013 at 11:23 AM, Steven M. Caesare <scaes...@caesare.com
> >
> > wrote:
> >
> > Substitute any risk you what in any circumstance you want.
> >
> >
> >
> > As long as the odds are > 0 then you have to consider mitigating that
> risk…
>
> > it then becomes a matter of cost to do so, the value proposition of which
> > depends on the potential damage from the event occuring.
> >
> >
> >
> > How unlikely does an event have to be in order to spend $X on it?
> >
> >
> >
> > -sc
> >
> >
> >
> > From: listsad...@lists.myitforum.com [mailto:listsadmin@lists.**
> myitforum.com <listsad...@lists.myitforum.com>]
> > On Behalf Of Micheal Espinola Jr
> > Sent: Friday, August 2, 2013 11:40 AM
> >
> >
> > To: ntsysadm@lists.myitforum.com
> > Subject: Re: [NTSysADM] man-in-the-middle attack
> >
> >
> >
> > Again, apples/oranges.  I'm speaking of specific circumstance, and I'm
> not
> > about to include natural disasters in the debate.  You can either choose
> to
> > see what I'm saying for what I'm saying, or don't.  I'm not generalizing.
> > I'm speaking of data loss to remote access intrusion.
> >
> >
> > --
> > Espi
> >
> >
> >
> >
> >
> > On Fri, Aug 2, 2013 at 6:53 AM, Steven M. Caesare <scaes...@caesare.com>
> > wrote:
> >
> >> The odds dont matter if the risk will result in catastrophic loss to the
> >> business.
> >
> >
> >
> > Sure they do.
> >
> >
> >
> > A meteor that wipes out your facility in North America can be mitigated
> by
> > having a completely redundant $50bil factory in Europe.
> >
> >
> >
> > Are you recommending that?
> >
> >
> >
> > -sc
> >
> >
> >
> >
> >
> > From: listsad...@lists.myitforum.com [mailto:listsadmin@lists.**
> myitforum.com <listsad...@lists.myitforum.com>]
> > On Behalf Of Micheal Espinola Jr
> > Sent: Wednesday, July 31, 2013 7:55 PM
> >
> >
> > To: ntsysadm@lists.myitforum.com
> > Subject: Re: [NTSysADM] man-in-the-middle attack
> >
> >
> >
> > IMO, its a matter of recreational gambling vs. professional (done for a
> > living) gambling[1].  You know the odds, or you don't - doesn't matter.
> > What matters is if you can continue to profit from the risk.  Will the
> risk
> > hurt the continuity of business operations in terms of revenue loss.  The
> > extreme example of this is Russian roulette.
> >
> >
> >
> > The resulting exposed data in a MitM scenario is unique and has
> substantial
> > potential.  What is important to monetize here is the loss resulting
> from a
> > MitM attack at all levels of remote access for the organization.
> >
> >
> >
> > The odds dont matter if the risk will result in catastrophic loss to the
> > business.  As someone that has discovered corporate espionage intrusions,
> > and systematically prevented the loss of future business deals worth
> > millions of dollars (whose loss would have otherwise collapsed the
> business)
> > - I have a specific view of this issue.  The only additional info on this
> > that I will provide is that the intrusion allowed a bidding competitor
> > access to corporate communications as well as business plans and bidding
> > documents.  My discoveries led to the prevention of a competitor from
> > staying one step ahead of us in business planning and bidding, and
> eventual
> > Federal prosecution of the intruder.
> >
> >
> >
> >
> >
> > 1. I'm not a gambler, but I have known professional gamblers.
> >
> >
> > --
> > Espi
> >
> >
> >
> >
> >
> > On Wed, Jul 31, 2013 at 4:05 PM, Ken Schaefer <k...@kj.net.au> wrote:
> >
> >> In any event, the odds are irrelevant - the issue is the business risk
> of
> >> intrusion/loss.
> >
> >
> >
> > How can you say that “odds are irrelevant” if the issue is business risk?
> >
> >
> >
> > Risk is “potential for loss”, and potential includes a weighting for
> > likelihood (i.e. “the odds”)?
> >
> >
> >
> > Can you clarify what you mean?
> >
> >
> >
> > Cheers
> >
> > Ken
> >
> >
> >
> > From: listsad...@lists.myitforum.com [mailto:listsadmin@lists.**
> myitforum.com <listsad...@lists.myitforum.com>]
> > On Behalf Of Micheal Espinola Jr
> > Sent: Thursday, 1 August 2013 1:43 AM
> >
> >
> > To: ntsysadm@lists.myitforum.com
> > Subject: Re: [NTSysADM] man-in-the-middle attack
> >
> >
> >
> > Odds would be very difficult to extrapolate with any legitimate
> accuracy, as
> > you need to know and control the possible environments and habits of your
> > remote employees.  In any event, the odds are irrelevant - the issue is
> the
> > business risk of intrusion/loss.
> >
> >
> > --
> > Espi
> >
> >
> >
> >
> >
> > On Wed, Jul 31, 2013 at 8:07 AM, David Lum <david....@nwea.org> wrote:
> >
> > I need to present management with the odds of this actually getting
> > exploited, as I’d want to force TLS 1.2 for ADFS but that takes Chrome
> and
> > more importantly Safari (iOS devices) out of the mix, so I suspect
> > management might say “we want compatibility instead of protection from
> some
> > obscure attack that is unlikely to happen.
> >
> >
> >
> > In short, what are the odds of a MITM attack actually happening between
> my
> > remote employee and our ADFS server?
> >
> > David Lum
> > Sr. Systems Engineer // NWEATM
> > Office 503.548.5229 // Cell (voice/text) 503.267.9764
>

Reply via email to