Security Basics mailing list archives

Network steganography-What is the risk?


From: Mork <martyfromork () gmail com>
Date: Tue, 13 Dec 2011 09:23:41 -0500

Hi group!

I have a case where a client has a video network where only camera
feed transits. The feed can be qualified as sensitive. If the feed
gets corrupted my client would face serious problems.

The client is afraid an ill intentioned person would try to insert
network steganography impregnated malware through the video feeds.

We've covered other types of risks, man in the middle, DoS etc..

My feeling is that the risk is minimal. Can you corrupt a video feed
to the point where it would affect the network?

What's your opinion on this?

Do you have examples where a video network was corrupted by steganography?

Any othe risks that you see?

Note : The network is not reachable from the Internet. To intrude you
would need to physically cut open a communication wire or access the
physically protected aedicule (small construction where telecom
equipment is housed) to connect to the internal network. Social
engineering is out of the question, only a handpicked few have access
to the network, let's assume it's secure from that point of view.

Thanks!

Mork

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: