Sorry all I forgot to place the Sc-L addy when replying.

Regards,
George
Greenarrow1
InNetInvestigations-Forensics


----- Original Message ----- 
From: "Greenarrow 1" <[EMAIL PROTECTED]>
To: "Dana Epp" <[EMAIL PROTECTED]>
Sent: Saturday, November 13, 2004 6:53 PM
Subject: Re: [SC-L] Secured Coding


> Hi Dana,
>
> This is exactly what firewalls and anti virus programs do as they need to 
> keep one foot ahead of the attacker.  If attacked, they must immediately 
> create a defense against the attack, but this is where I see a fault in a 
> lot of programming.  My thinking is who is really at fault the developer, 
> IT security reviewer or both?  I have monitored 2 specific companies that 
> are in the security fields.  When they create new programs one does fairly 
> well while the other still stay with the programming of the past soft 
> wares, just upgrading enough to fool the user.  In my business I have 
> programs that can look at every piece of coding built within.  It 
> surprises me at the total lack of revamping security in their upgrading of 
> programs or producing new ones.
>
> What I am getting at if other companies do as this, one does not wonder 
> secured coding is dismal.  The one item I noticed that there is a high 
> amount of greed within certain companies.  Get the product out no matter 
> what and if enough buyers complain then we might patch it.  Naturally 
> speed is essential in combating a attacker but why does one company use 
> speed and creativity to its advantage while another one is so sloppy the 
> patch is actually more damaging then the attack.  How do we stop this?  I 
> am totally against suing companies that produce bad coding that results in 
> damage to users systems because I feel no law can be written without 
> creating a huge mitigation of cases no matter how minor.  Companies are 
> afraid to share info because of infringements or copy write problems. 
> This can be seen all over the internet.  As in the case one reader 
> responded that I do not have time to peruse any security newsletters. 
> Well, duh, are they that valuable or superior to any other developer that 
> 5, 10, or 15 minutes is going to destroy their day.  I only subscribe to 5 
> security newsletters and when there is nothing that pertains or relates to 
> anything I do I just delete it. But I have found some valuable info from 
> posts while not in the language I use but still has affects upon what I 
> do.
>
> I am not in to heavy programming but I do create soft wares and scripts 
> needed in computer forensics.  I also use Encase which in some cases I or 
> my co-workers must create script to find what we are searching for.  One 
> item is all our programs must be highly secured as we cannot leave any 
> evidence that we were searching ones computer for criminal prosecution. 
> My guidelines are that all programs created must be tested and then 
> reviewed, then back to the developer for corrections, then retested, 
> reviewed again then back to the developer.  The final version than is 
> again tested by our CSO, which is forwarded to me and if it meets all 
> security guidelines it is then used by all workers.  Yes this takes time 
> but it saves lots of work and cuts cost of having to revamp the program if 
> it is flawed.  When a company has to patch or upgrade because of secured 
> coding it costs more then if they would have taken the time to secure it 
> correctly in the first place. Companies do not see this as the objective 
> is get the new product out.  If they would review the costs of patching 
> then issuing the patch to everyone plus the man hours they would see this 
> waste of monies.
>
> I know I am raving on so will close with I Wish You a Very Happy 
> Thanksgiving.
>
> I am happy to see subscribers again communicating on Sc-L as it was laying 
> dead in the water for a while.  Just maybe if we all put our heads 
> together we might have a solution to secured coding.
>
> Regards,
> George
> Greenarrow1
> InNetInvestigations-Forensics

Reply via email to