[535] in Intrusion Detection Systems
Re: Intrusions
daemon@ATHENA.MIT.EDU (Allwyn Crichlow)
Tue Feb 6 02:18:04 1996
From: Allwyn Crichlow <allwync@smooth.internic.net>
To: ids@uow.edu.au
Date: Thu, 1 Feb 1996 11:53:38 -0500 (EST)
In-Reply-To: <9601310334.AA08507@all.net> from "Fred Cohen" at Jan 30, 96 10:34:36 pm
Reply-To: ids@uow.edu.au
Good piont. If your security is minimal an intruder does not need your
system for information, it can be used as his hub to attack others.
ANALOGY: He wouldn't need his on safe he could use yours since it's not really
in use by you (am I wrong?)
Allwyn Crichlow
InterNIC
/* There three type of computer users in the world. */
/* Those who don't know what's happening. */
/* Those who wonder what's happening. */
/* And people like me that make things happen! */
>
> > On Sun, 28 Jan 1996, Paul G. Seldes wrote:
> >
> > > One thing to keep in mind is that it is often to ensure that intruders can't do
> > > anything on a system rather than try to prevent them from intruding in the first place.
> > > If you break into a safe, and there is nothing there....you leave.
> > > This angle works for many businesses and users.
>
> Why have a safe if there's nothing in it?
>
> If the content of your computer is worthless, why have a computer?
>
> -> See: Info-Sec Heaven at URL http://all.net/
> Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236
>