[526] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Advice for Risk Assessment consultant (was Re: Intrusions)

daemon@ATHENA.MIT.EDU (Dale Whiteaker-Lewis)
Thu Feb 1 00:33:42 1996

Date: Wed, 31 Jan 1996 09:09:14 -0600 (CST)
From: Dale Whiteaker-Lewis <dalewl@radian.com>
To: ids@uow.edu.au
In-Reply-To: <9601301440.AA02689@willow.c3i.saic.com>
Reply-To: ids@uow.edu.au

Speaking of risk assessment, my company is looking for qualification 
statements from consultants prepared to do a thorough risk assessment of 
the computing practices of an international environmental consulting 
company.  Does anybody have any leads to this sort of consultant or (more 
importantly) recommendations for a particular consultant?  Your help 
would be most appreciated.

On Tue, 30 Jan 1996, Ira S. Winkler wrote:

> When you conduct a thorough risk assessment, you have to look at the threats
> and vulnerabilities by default.  I tend to believe that vulnerabilities are
> more important to consider than threats, in most cases, because threats would
> be irrelevant if there are no vulnerabilities.  It is true that vulnerabilities
> would be irrelevant without threats, but if you have anything of value than
> there will be a threat.  
> 
> The big question becomes how much money do you want to put towards 
> countermeasures, which is dependent upon the value of your information and
> the value of the services dependent upon your information resources.
> 
> Ira
> 
> [Quoted Article Deleted]


home help back first fref pref prev next nref lref last post