Penetration Testing mailing list archives

Re: Patterns and Security Measurement


From: Dan Catalin Vasile <hardware_cta () yahoo com>
Date: Sun, 7 May 2006 23:03:36 -0700 (PDT)

Hi,
There is no 'one way' to measure security because you
don't have a ruler accepted by everybody for that.
Instead, there are several aproaches...
One would be to perform an audit. Here you can choose
between ISO 17799 (more 'commercial' version) and all
the other standards that put together generated ISO
17799, or you can choose OSSTMM. Open source... you
know, more likeit. There are consistent differences
between the tow. ISO is theoretical while OSSTMM is
more practical. But you can do some googleing to
figure out what is best for you.
Another approach would be... surprise! a pen test. :)
But it seems the problem is a little bit complex for
this.
You can also try a risk management and vulnerability
assessment approach.

Remember that the best security solution money can buy
is worthless if it's not used correctly. The idea is
to develop the best security with the resources you
have.

Greets,
Dan


--- Nguyen Pham <nguyen.petronius () gmail com> wrote:

Hi list,

Actually, I am trying to measure security (and then
security assurance) 
level of a complex telecommunication network. I am
looking for a 
method/approach/product using sets of predefined,
standard entities 
(station, server, firewall, router, ...) and
relations (forming 
"patterns" like pipe, cluster, bus, gateway, ...,
architectures) which 
have already been measured to simplify the process
of system security 
measurement. An aggregation algorithm is then needed
to arrive at an 
overall system security value.

Any recommendation of academic or industrial
solutions would be welcome.

Other suggestions for solving the problem (security
measurement of 
complex network) are also greatly appreciated.

Many thanks,
Nguyen Pham.


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only
one to win the Analyst's 
Choice Award from eWeek. As attacks through web
applications continue to rise, 
you need to proactively protect your applications
from hackers. Cenzic has the 
most comprehensive solutions to meet your
application security penetration 
testing and vulnerability management needs. You have
an option to go with a 
managed service (Cenzic ClickToSecure) or an
enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how
a managed service can 
help you:
http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit
for you to confirm your 
results from other product. Contact us at
request () cenzic com for details.

------------------------------------------------------------------------------




__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: