Priscilla Oppenheimer wrote:
> Reimer, Fred wrote:
> 
>>Structured
>>Unstructured
>>Internal
>>External
> 
> 
> What is a structured versus unstrucuted security threat?
> 
> There sure are a lot of "unstructured" ones going on right now. Anyone else
> seeing a huge increase in pings? I guess it's the welchia virus. It's
> getting ugly. And the amount of spam from sobig is really astounding.
> 
> Perhaps we need a more structured way of allowing clueless users to get on
> the Internet. Maybe ISPs that don't provide personal firewalls and
> anti-virus software for their end users should be disallowed somehow. (I'm
> thinking that most of the problems are coming from clueless home and small
> business users, not enterprise networks, where things are more
"structured,"
> hopefully.)

   Ha, you be thinking incorrectly!  Big doesn't equal smart.  Also 
users bring their laptop outside a secure network, get the
"disease" and spread it around the "secure" network.  Job security no;)

   Dave

> 
> Priscilla
> 
> 
>>It's covered in every training course I've taken so far on my
>>way to CCSP.
>>CSVPN covers it, SECUR covers it, CSI covers it, I believe
>>CSPFA covers it,
>>and CSIDS probably covers it.
>>
>>Joshua covered the four remote-access types nicely...
>>
>>Fred Reimer - CCNA
>>
>>Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA
>>30338
>>Phone: 404-847-5177  Cell: 770-490-3071  Pager: 888-260-2050
>>
>>NOTICE; This email contains confidential or proprietary
>>information which
>>may be legally privileged. It is intended only for the named
>>recipient(s).
>>If an addressing or transmission error has misdirected the
>>email, please
>>notify the author by replying to this message. If you are not
>>the named
>>recipient, you are not authorized to use, disclose, distribute,
>>copy, print
>>or rely on this email, and should immediately delete it from
>>your computer.
>>
>>
>>-----Original Message-----
>>From: Marko Milivojevic [mailto:[EMAIL PROTECTED] 
>>Sent: Sunday, August 24, 2003 8:29 PM
>>To: [EMAIL PROTECTED]
>>Subject: Re: SAFE and the Holy Hand Grenade of Antioch [7:74304]
>>
>>
>>>Yet when I go through the SAFE documentation, I find:
>>>     7 Axioms of types of targets (p. 5 of PDF)
>>>     3 Types of Expected Threats (p. 10)
>>>     3 separate validation services for remote user access
>>
>>(p. 30)
>>
>>>    12 elements of the taxonomy of network attacks (p. 56),
>>
>>some of
>>
>>>       which are actually host attacks.
>>>
>>>No number that is four.
>>
>>    Uhm, this is 4-items list... ;-)
>>
>>
>>Marko.
>>**Please support GroupStudy by purchasing from the GroupStudy
>>Store:
>>http://shop.groupstudy.com
>>FAQ, list archives, and subscription info:
>>http://www.groupstudy.com/list/cisco.html
> **Please support GroupStudy by purchasing from the GroupStudy Store:
> http://shop.groupstudy.com
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> 


-- 
David Madland
CCIE# 2016
Sr. Network Engineer
Qwest Communications
612-664-3367

"Government can do something for the people only in proportion as it
can do something to the people." -- Thomas Jefferson




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74349&t=74304
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

Reply via email to