[532] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: Intrusions

daemon@ATHENA.MIT.EDU (Fred Cohen)
Thu Feb 1 00:49:56 1996

From: fc@all.net (Fred Cohen)
To: ids@uow.edu.au
Date: Tue, 30 Jan 1996 22:34:36 -0500 (EST)
In-Reply-To: <Pine.SUN.3.91.960130100946.3826A-100000@tiger> from "Greg Foulds" at Jan 30, 96 10:25:11 am
Reply-To: ids@uow.edu.au

> On Sun, 28 Jan 1996, Paul G. Seldes wrote:
> 
> > One thing to keep in mind is that it is often to ensure that intruders can't do
> > anything on a system rather than try to prevent them from intruding in the first place.  
> > If you break into a safe, and there is nothing there....you leave.
> > This angle works for many businesses and users.

Why have a safe if there's nothing in it?

If the content of your computer is worthless, why have a computer?

-> See: Info-Sec Heaven at URL http://all.net/
Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236

home help back first fref pref prev next nref lref last post