[4001] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: OS/390 and WWW

daemon@ATHENA.MIT.EDU (Dan Geer)
Thu Jan 16 16:33:47 1997

To: Arjan Vos <arjan@pino.demon.nl>, Shin Katsumata <skat@flask.com>
cc: www-security@ns2.rutgers.edu
In-reply-to: Your message of "Wed, 15 Jan 1997 23:45:21 +0100."
             <Pine.LNX.3.95.970115233713.416A-100000@pino.demon.nl> 
Date: Thu, 16 Jan 1997 10:42:14 -0500
From: Dan Geer <geer@openmarket.com>
Errors-To: owner-www-security@ns2.rutgers.edu


  > Many intranets I've seen were wide open to all the company - worse
  > companies are implementing intranest without knowing what they're doing. 

Repeating what for me is a mantra, real security threats are
largely due to the lack of an adequate internal security
regime.  Perry Mason evaluation (motive and opportunity)
is optimal for the insider and, for that matter,

Q: What is the first measure of success for an external attacker?
A: Gaining the identity of an internal person.

So, if you have a well thought internal security regime
with compartmentalization of its failure modes, you solve
much of the external attack problem as a side effect or at
least can do so at little marginal cost.

--dan


home help back first fref pref prev next nref lref last post