RE: Political Challenges Using Nessus

2002-03-16 Thread Pragmatix - Ernst
ginal Message- From: Anthony D. Eaker [mailto:[EMAIL PROTECTED]] Sent: 14 March 2002 04:44 To: tony toni; [EMAIL PROTECTED] Subject: Re: Political Challenges Using Nessus Be very careful of running any type of security scan without permission from those who manage the systems yo

Re: Political Challenges Using Nessus

2002-03-16 Thread iping00
;Hopkins, John A. [C]" <[EMAIL PROTECTED]> To: "'tony toni'" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Wednesday, March 13, 2002 4:37 PM Subject: RE: Political Challenges Using Nessus > Tony, > > As hard as it may be, you MUST NOT run any In

RE: Political Challenges Using Nessus

2002-03-16 Thread Tom Kapanka
Get premission in WRITING. With a signature. No email. -T > -Original Message- > From: tony toni [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, March 12, 2002 11:44 AM > To: [EMAIL PROTECTED] > Subject: Political Challenges Using Nessus > > > Folks, > > I am currently experimenting with N

RE: Political Challenges Using Nessus

2002-03-16 Thread Jeremy Shelley
Provided you have the project assignment from your director in writing (or e-mail) then you should have no qualms about doing your job. If the Manager of the Server and Network Group starts stonewalling you, then you could either (a) have a conversation with HIS boss or (b) go back to the Directo

Re: Political Challenges Using Nessus

2002-03-16 Thread Radoslav Dejanović
On Tuesday 12 March 2002 20:44, tony toni wrote: > off. Problem is management is getting in my way. What is your answers > to my questions? > > Tony > Security Project Lead > Major Financial Institution on West Coast Your signature is your answer. :) If that is a major financial institution,

RE: Political Challenges Using Nessus

2002-03-16 Thread James McGee
Tony I have a similar situation. The guy I am working for, has no idea about security and calls himself the Security Manager. And yet, wants everything tied up. If I was you, I would a) Go above them if possible, sort of offline, in a conversation, see if direction/approval can come from furth

Re: Political Challenges Using Nessus

2002-03-14 Thread Anthony D. Eaker
Be very careful of running any type of security scan without permission from those who manage the systems you are scanning. There have been highly publicized cases where this, as well intentioned as it may have been, has led to loss of employment and legal action against someone who has done such

Re: Political Challenges Using Nessus

2002-03-14 Thread dewt
Get approval to run the scans, in writing or at least in an archived email message. If anything goes wrong, the buck stops with whoever gave you approval. (not that it's less of a worry if something goes wrong when a hax0r does it) On Tuesday 12 March 2002 01:44 pm, tony toni wrote: > Folks, >

RE: Political Challenges Using Nessus

2002-03-14 Thread Jon Erickson CCG
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > -Original Message- > From: tony toni [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, March 12, 2002 11:44 AM > To: [EMAIL PROTECTED] > Subject: Political Challenges Using Nessus > This is my question... > 1) What are the political risks I

RE: Political Challenges Using Nessus

2002-03-14 Thread Vachon, Scott
>My problem... >I am not sure if I can trust either my Director or the Manger of >Network/Servers if I start running Nessus. Both have a keen sense of >corporate politics and only look out for themselves. My manager want >results..but then he offers no support and will *nail* me hard if I mak

RE: Political Challenges Using Nessus

2002-03-14 Thread Hornat, Charles
I am so happy to see someone actually putting thought in before just running off and launching scans. I wish my admins thought like you. Here is what I require before any assessment is done. I have a form that I fill out with specific info. The sheet contains information like the following:

RE: Political Challenges Using Nessus

2002-03-14 Thread Hopkins, John A. [C]
Tony, As hard as it may be, you MUST NOT run any Intrusion Detection or vulnerability scans within your organization until you have, at a minimum, management's direction and approval IN WRITING! The only way to securely, safely, correctly, and legally, conduct any security assessment and/or proc

RE: Political Challenges Using Nessus

2002-03-14 Thread Security Team
Did you say your boss was a moron about security... ;-)? First, be careful. Unfortunately it could be construed as illegal activity without a "get out of jail" note from your boss, your boss's boss or someone of authority in your company. Another possible approach might be to set up a snort box

RE: Political Challenges Using Nessus

2002-03-14 Thread geert . bex
This isn't about security, it's about company politics. A few tips: 1. NEVER run stuff like Nessus without proper written permission. If you get caught you'll be treated as a criminal. 2. Try getting the Network and Server manager on your side by offering to help him improve on his security issue

RE: Political Challenges Using Nessus

2002-03-14 Thread Matthew F. Caldwell
-Original Message- From: tony toni [mailto:[EMAIL PROTECTED]] Sent: Tuesday, March 12, 2002 2:44 PM To: [EMAIL PROTECTED] Subject: Political Challenges Using Nessus Folks, I am currently experimenting with Nessus. I also have a spreadsheet of all IP addresses that our company uses (ab