Priscilla Oppenheimer wrote: > Reimer, Fred wrote: > >>Structured >>Unstructured >>Internal >>External > > > What is a structured versus unstrucuted security threat? > > There sure are a lot of "unstructured" ones going on right now. Anyone else > seeing a huge increase in pings? I guess it's the welchia virus. It's > getting ugly. And the amount of spam from sobig is really astounding. > > Perhaps we need a more structured way of allowing clueless users to get on > the Internet. Maybe ISPs that don't provide personal firewalls and > anti-virus software for their end users should be disallowed somehow. (I'm > thinking that most of the problems are coming from clueless home and small > business users, not enterprise networks, where things are more "structured," > hopefully.)
Ha, you be thinking incorrectly! Big doesn't equal smart. Also users bring their laptop outside a secure network, get the "disease" and spread it around the "secure" network. Job security no;) Dave > > Priscilla > > >>It's covered in every training course I've taken so far on my >>way to CCSP. >>CSVPN covers it, SECUR covers it, CSI covers it, I believe >>CSPFA covers it, >>and CSIDS probably covers it. >> >>Joshua covered the four remote-access types nicely... >> >>Fred Reimer - CCNA >> >>Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA >>30338 >>Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050 >> >>NOTICE; This email contains confidential or proprietary >>information which >>may be legally privileged. It is intended only for the named >>recipient(s). >>If an addressing or transmission error has misdirected the >>email, please >>notify the author by replying to this message. If you are not >>the named >>recipient, you are not authorized to use, disclose, distribute, >>copy, print >>or rely on this email, and should immediately delete it from >>your computer. >> >> >>-----Original Message----- >>From: Marko Milivojevic [mailto:[EMAIL PROTECTED] >>Sent: Sunday, August 24, 2003 8:29 PM >>To: [EMAIL PROTECTED] >>Subject: Re: SAFE and the Holy Hand Grenade of Antioch [7:74304] >> >> >>>Yet when I go through the SAFE documentation, I find: >>> 7 Axioms of types of targets (p. 5 of PDF) >>> 3 Types of Expected Threats (p. 10) >>> 3 separate validation services for remote user access >> >>(p. 30) >> >>> 12 elements of the taxonomy of network attacks (p. 56), >> >>some of >> >>> which are actually host attacks. >>> >>>No number that is four. >> >> Uhm, this is 4-items list... ;-) >> >> >>Marko. >>**Please support GroupStudy by purchasing from the GroupStudy >>Store: >>http://shop.groupstudy.com >>FAQ, list archives, and subscription info: >>http://www.groupstudy.com/list/cisco.html > **Please support GroupStudy by purchasing from the GroupStudy Store: > http://shop.groupstudy.com > FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html > -- David Madland CCIE# 2016 Sr. Network Engineer Qwest Communications 612-664-3367 "Government can do something for the people only in proportion as it can do something to the people." -- Thomas Jefferson Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=74349&t=74304 -------------------------------------------------- **Please support GroupStudy by purchasing from the GroupStudy Store: http://shop.groupstudy.com FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

