Vulnerability Development mailing list archives
Thinking about Security rules...
From: Rhino Bond <rhino007_us () yahoo com>
Date: Wed, 8 May 2002 14:37:05 -0700 (PDT)
Folks, Since many of us are intensly commited to learning, research and knowledge I felt it appropriate to post this here. At my current contract we are trying to come up with a set of rules that is "all inclusive" (as much as possible). Granted a Security Policy is part of it, so are firewall rules, so might be the rules for the IDS. When I asked for further clarification on this topic, I was told, "you know something like "fuzzy-logic" that states IF "A" then "Z" (for example a hacker is hacking away at the firewall), BUT if the hacker breaks through the firewall, then We need to jump to IDS rules, so now it's IF B then Y, and if the hacker get's into the corporate piggy bank and steals money, then it's IF C then X... Any thoughts on this? Anyone seen a white paper on such a set of rules? Cheers, David David R. Hawley, CISSP __________________________________________________ Do You Yahoo!? Yahoo! Health - your guide to health and wellness http://health.yahoo.com
Current thread:
- Thinking about Security rules... Rhino Bond (May 08)
- Re: Thinking about Security rules... Peter Kristolaitis (May 08)
- RE: Thinking about Security rules... Sean Convery (May 09)
- Re: Thinking about Security rules... f.harster (May 09)
- Re: Thinking about Security rules... Ray Parks (May 09)
- Re: Thinking about Security rules... f.harster (May 10)
- Re: Thinking about Security rules... Harvey Newstrom (May 10)
- Re: Thinking about Security rules... Geoff Galitz (May 13)
- Re: Thinking about Security rules... Rhino Bond (May 14)
- Re: Thinking about Security rules... Geoff Galitz (May 14)
- Re: Thinking about Security rules... Ray Parks (May 09)
- Re: Thinking about Security rules... Peter Kristolaitis (May 08)
- <Possible follow-ups>
- RE: Thinking about Security rules... Mendoza Bazan, Luis - (Per) (May 14)