Security Basics mailing list archives
Re: Securing workstations from IT guys
From: James Alcasid <james.alcasid () va gov>
Date: Wed, 28 Nov 2007 12:52:07 -0500
I agree Nick there are better ways to conduct security audits that are less overtly intrusive. Imagine if a keylogging device was compromised what the legal ramifications of such would be or how the data can be manipulated. It appears as if in this firm there is ZERO IT Governance, basically all IT access controls, methodologies, conventions and such are black box operations. IT says all of their personnel need 100% access to all systems and that is the way that it is and that is not really the case in most situations. I still stand by the assertion that a infoSec officer position needs to be created that would have some oversight on these security issues that are getting out of hand. Offer letters and salaries are getting compromised because of excessive access. First and foremost before any kind of technology implementation is in place there needs to be a policy and signoff by the IT department on security compliance. -- James Alcasid | VTI
From: Nick Vaernhoej <nick.vaernhoej () capitalcardservices com> Date: Tue, 27 Nov 2007 18:41:27 -0600 To: security-basics <security-basics () securityfocus com> Conversation: Securing workstations from IT guys Subject: RE: Securing workstations from IT guys Resent-From: <security-basics-return-46636 () securityfocus com> Resent-Date: Wed, 28 Nov 2007 08:38:45 -0700 (MST) A key logger? At what point are we crossing the line of common decency towards co-workers? I realize it is company property and all, but if you log access to sensitive files and audit these logs do you really need to be more intrusive? This is not an attack, more a tagged on question to everyone? Is keystroke logging commonly accepted by you? Nick Vaernhoej "Quidquid latine dictum sit, altum sonatur." -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Vandenberg, Robert Sent: Tuesday, November 27, 2007 11:18 AM To: security-basics Subject: RE: Securing workstations from IT guys Those are good points. I would recommend that you put in a keystroke logger program with the written approval of your upper management on the PCs in question and then download the logs each day. That way you are able to create a forensics "e-Trail" that can be used to confront/counsel/etc. them. I would also make sure that you look at your documenation and ensure that each IT person has signed a document stating that they will not use their abilities improperly. Combine those two and you have a means of pursuing them legally. This electronic transmission is intended for the addressee (s) named above. It contains information that is privileged, confidential, or otherwise protected from use and disclosure. If you are not the intended recipient you are hereby notified that any review, disclosure, copy, or dissemination of this transmission or the taking of any action in reliance on its contents, or other use is strictly prohibited. If you have received this transmission in error, please notify the sender that this message was received in error and then delete this message. Thank you.
Current thread:
- RE: Securing workstations from IT guys, (continued)
- RE: Securing workstations from IT guys Erin Carroll (Nov 27)
- Re: Securing workstations from IT guys Christian Brenner (Nov 27)
- RE: Securing workstations from IT guys Holtz,Robert (Nov 27)
- Re: Securing workstations from IT guys Micheal Espinola Jr (Nov 29)
- RE: Securing workstations from IT guys Vandenberg, Robert (Nov 27)
- RE: Securing workstations from IT guys Nick Vaernhoej (Nov 28)
- Network protocol analyzers Malhoit, Lauren (Nov 28)
- Re: Network protocol analyzers Michael R. Martinez (Nov 28)
- RE: Network protocol analyzers Chris Boczko (Nov 28)
- Re: Network protocol analyzers crazy frog crazy frog (Nov 28)
- Re: Securing workstations from IT guys James Alcasid (Nov 28)
- RE: Securing workstations from IT guys Petter Bruland (Nov 28)
- RE: Securing workstations from IT guys Big Joe Jenkins (Nov 28)
- Re: Securing workstations from IT guys Eric Marden (Nov 29)
- RE: Securing workstations from IT guys Vandenberg, Robert (Nov 29)
- Re: Securing workstations from IT guys Ansgar -59cobalt- Wiechers (Nov 29)
- RE: Securing workstations from IT guys Nick Vaernhoej (Nov 29)
- Removable media Worrell, Brian (Nov 30)
- Re: Removable media Albert R. Campa (Nov 30)
- Re: Securing workstations from IT guys Vinny (Nov 29)
- RE: Securing workstations from IT guys Craig Wright (Nov 29)