That doesnt actually equate to a network based intrusion at all. You cant simply see through a port and identify valuable data on the other side. An intrusion still has to take place.
-- ME2 On Fri, Feb 20, 2009 at 11:58 AM, Eric Brouwer <[email protected]> wrote: > Actually, your shade example is a good one. Your closed shades would stop > the random, wanna be burglar from taking a chance on breaking into your > house, and finding nothing. They can't see that you have "stuff" through > your windows. They just want quick cash, so they walk next door and see > your neighbors wallet with cash sticking out on his table through the > window. They break in his house, and take the easy, visible cash. > > On Feb 20, 2009, at 11:40 AM, Micheal Espinola Jr wrote: > >> My final rebuttal is this: There is no value in an aspect of security >> or security process that can not be quantified. To do so is therefor >> meaningless, and therefore has no value - other than some human oddity >> that makes you personally feel good about doing it. >> >> Im going to go pull the shades down on all my windows and pretend >> there are no bad guys outside. :-) >> >> -- >> ME2 >> >> >> >> On Fri, Feb 20, 2009 at 10:57 AM, Jonathan Link <[email protected]> >> wrote: >>> >>> I will stipulate that security only by obscurity is false security. But >>> likely to remain unconvinced that there is no role or value for obscurity >>> in >>> the security process. >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > > Eric Brouwer > IT Manager > www.forestpost.com > [email protected] > 248.855.4333 > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
