Hello,

While I'm sure your mailbox is full of replies to either you should
resign, try to make a difference, or even suck it up and stay, I'd like
to actually expand more on the security aspect of your letter.

There are many local ISP's in various cities around the US that have no
security. What is even worse is that in many cases the network abuse is
actually caused from their own people. Many ISP's are simply extentions
of other "traditional" retail stores that wanted to cash in the internet
"trend" and hired some wiz kids out of their local college and put them
to work.

So you're not alone. I've been in places where employees were sharing
"funny" emails of customers. Where credit card numbers were kept in a
DOS text file. Where all the passwords where one and that was kept in a
sticky on the company's bulletin.

When a company has been running for a while like that and nothing has
happened, it is hard to convince the owners, that have seen (or not) a
return of the investment with the existing policies in place. What have
I done in the past? Get the owners (WRITTEN) permission to allow you to
break into their systems, then show them the abuse and how easy it was
done. In cases where you are working against the existing system
administrator you may or may not want to pick that battle. Up to you.

As for your particular situation, if it is indeed as big of an
organization as you describe, snort and BlackICE would hardly be
sufficient at this point. You would need a hardware-based firewall with
stateful packet inspection at your gateway and a host-based IDS system
to pick up any continuous attempts. You would also need a very detailed
audit of the rest of the security measures. Usually a company so relaxed
with their network security also lacks in other security areas as well
(the password on the sticky scenario).

Sorry that this is really not an advice in your situation but I'm afraid
that if you were to fight this you would need to establish a much more
efficient solution than snort/BlackICE (that I'm sure was just an
example) since when/if that fails then it will be all you that would
take that fall.

Good luck.

Nicko

-----Original Message-----
From: A Question [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, January 01, 2002 12:38 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Is it bad enough to resign?


Greetings,

Beg your parden for sending, but I could use your
advice.

I have been reading this list for some time and have
benefited from it.  There are some good minds on this
list, and a lot of experience, so I submit my question
to you seeking your perspective.

Before I begin, I want to tell you that I have already
made up my mind weather to resign or not, what I am
needing is perspective as the company I work for is
the only one I have worked at as a Systems
Administrator, and the only one that I have been
responsible for securing the system.

The security for the network and servers I administer
is NON-EXISTENT.  This is not only fine with my
superiors, but I have been told to not work on
security anymore, as it is "un-important".  The CEO
thinks that it is secure because my CIO lies and tells
him that it is.

Here is some background.  We have approx. 14,000 IP's
in a stub network (only one way in or out on the
router).  Since those IP's are mostly used to host
virtual hosts, there is over 100,000 total paying
customers that depend on our systems being secure.

We tell customers and the CEO that we have a firewall
- it's a lie.

* WE HAVE NO FIREWALL ON OUR ENTIRE NETWORK.
* WE HAVE NO INTRUSION DETECTION ON OUR SYSTEM

We use Linux and Windows.  Windows is even more
pathetic as we depend on hotfixes and Service Packs as
our ONLY form of Windows security.  They won't let me
put Snort on it, and they won't buy Black Ice, or
anything else.

To top this off, the CIO refused to let me apply
Service Pack 2 to Windows for months after the
release.  I brought it up every week at our management
meeting.  Finally, several Windows machines were
compromised so that the cracker had admin level access
for weeks before it was even detected.  This would
have been prevented if they would have only let me
apply SP2!   The CIO kept saying that he could hear me
saying "I told you so".  The CIO lied to the CEO and
said that it was not a Admin level intrusion, but
merely a rouge FTP account used for Warez.  The
cracker could have formatted the drives with data at
any time!

It gets even worse than this, but you get the idea.  I
prevented Nimda and Code Red attacks even while
everyone else was wondering what they are.

Do they promote me?  Reward me?  No.  Apparently, they
are too embarrassed as my CIO and Managers that they
are incompetent in security (they setup up the systems
this way, after all), and seeking to keep me quiet,
they demoted me so that I wouldn't be responsible for
security anymore.  As far as I can tell, the only
reason I was promoted to Security Manager was so that
they could have a fall-guy when things went wrong "How
did they do that?  Weren't you doing your job?".  But
when their scheme backfired and I actually did such a
good job that their position in front of the CEO was
threatened, they decided to keep me quiet.

Am I being paranoid?  Am I overacting?  Your
perspective from your experience would be greatly
appreciated.  Also, after I leave, should I send a
letter to the CEO about this?


Thanks



__________________________________________________
Do You Yahoo!?
Send your FREE holiday greetings online!
http://greetings.yahoo.com

Reply via email to