I agree with you that it is a pretty serious issue if it is not searchable
on Cisco's site, or in their SAFE white papers.  However, it IS in every
single }current{ documentation/training materials for their security
certifications.  Well, at least for all of their CCSP security
certifications.  I have all of the materials for all of the current courses,
and it is in every single one of them.

Fred Reimer - CCNA

Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177  Cell: 770-490-3071  Pager: 888-260-2050

NOTICE; This email contains confidential or proprietary information which
may be legally privileged. It is intended only for the named recipient(s).
If an addressing or transmission error has misdirected the email, please
notify the author by replying to this message. If you are not the named
recipient, you are not authorized to use, disclose, distribute, copy, print
or rely on this email, and should immediately delete it from your computer.


-----Original Message-----
From: Howard C. Berkowitz [mailto:[EMAIL PROTECTED] 
Sent: Monday, August 25, 2003 4:45 PM
To: [EMAIL PROTECTED]
Subject: RE: SAFE and the Holy Hand Grenade of Antioch [7:74304]

At 7:10 PM +0000 8/25/03, Reimer, Fred wrote:
>A structured threat is a threat from someone who has experience and
>knowledge as far as breaking into networks.  An unstructured threat is a
>threat by a script kiddie.  I guess they use structured because a
>knowledgeable black-hat would have a comprehensive plan on the attack,
>whereas an unstructured threat would just be looking for the latest
>Microsoft bug ;-)
>

It still seems a Cisco problem that CCO searches on "structured 
threat" or "structured attack" return nothing, nor are they in the 
SAFE white papers.

Interesting, a Google search on Cisco and "structured threat" did 
bring up a few hits.  http://www.coact.com/spock/spmin.oct97.html 
reveals a presentation by ISS Corporation on _their_ SAFE 
Architecture.  The NSA director is quoted as defining structured vs. 
unstructured at 
http://www.kbeta.com/SecurityTips/Vulnerabilities/SpottingIntruders.htm

To me, this is a significant documentation failure by Cisco.  Not all 
working professionals are going to take every course Cisco offers.

It's especially important that Cisco be clear about its terminology, 
since I have encountered a number of concepts where SAFE or other 
documents use terminology differently than one finds in the general 
professional literature on security. Quite a number of cryptographic 
terms seem to be thrown about without rigorous definitions.
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74373&t=74304
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

Reply via email to