I don't understand how "hurt feelings" got into this but email can drift off
topic in a flash. And how is anyone going to know your monitoring a port
unless you advertise it? Is this water cooler chat? Not much security there.
Soapbox email.

Why would I be embarrassed about doing my job, monitoring firewall traffic?
Jumping to strange conclusions...

In an attempt to return to the original thought...

If you are going to monitor employee's, users and/or  network traffic, you
need to have what is called a "Unauthorized Use.." statement before a user
signs on. This has been a common topic (and common knowledge) in security
seminars give by security organizations. Attorney's need some information
that allows them to hold a hacker's feet to the fire for violating. Passages
like " log off if you're not a valid user" are in fact worthless. Why? Easy.
Say it's a new user at a company or at a university. At many university's
there are menu's for new students to use to obtain an account. At the time
the student first logs on though, they are not a valid user. There are
several boiler-plate examples in firewall books that put some teeth into an
"Unauthorized Use.." statement.

And believe it or not, there's no mention of "hurt feelings".

Good Luck.

> -----Original Message-----
> From: Information Security [SMTP:[EMAIL PROTECTED]]
> Sent: Tuesday, January 19, 1999 10:23 PM
> To:   [EMAIL PROTECTED]
> Subject:      RE: Content filtering
> 
>    >   Date: Tue, 19 Jan 1999 10:50:32 -0500
>    >   From: "Knapp, Ken (SD-EX)" <[EMAIL PROTECTED]>
>    >   Subject: RE: Content filtering
>    >
>    >   Sorry. I can't agree. 
>    >
>    >   I used to work for a government law enforcement agency and we
> enforced what
>    >   you just stated. Don't steal. That's the example you just wrote and
> its not
>    >   "inconsistent" with the law. To put in place a security policy that
> enforces
>    >   this is consistent with corporate and public law, and that is to
> "not take"
>    >   something that doesn't belong to you.
>    >
>    >   I believe what Todd said, and please correct me if I'm mis-stating
> this, is
>    >   a policy that is "inconsistently more strict.."
> 
> Yabut I know Todd, and I doubt he was talking legalistically, like you.
> He talked about "annoying people". Let's call that "systems analysis". ;-)
> 
> 
>    >   I'm all for monitoring...
> 
> Yet you sound embarrassed by it. "If you invade privacy..."
> Bennett referred to "censor".
> 
> Gosh, ain't there a way to monitor firewall traffic
> without running into hurt feelings simply because
> port SMTP is being checked?
> 
> Sure: notify all employees that Internet email traffic,
> along with anything else passing through the firewall
> is being monitored.  And, of course, state it clearly
> in the employment contract.
> 
> When I went in to do email traffic analysis at one site,
> I had to sign a standard (for them) page saying I allowed
> them to monitor my phone conversations.
> 
> Did I have hurt feelings that the company wanted to monitor
> its own equipment?
> 
> No, especially since I was notified.
> 
> People might still have hurt feelings, but at least
> they've been notified.
> 
> ----
> 
>    >   I'm all for monitoring, I do with our firewall and have with
> others.
>    >   But it's not something I sit there and do all day long.
> 
> At some point, that needs to happen, if you're going to have
> content security. I'd say over 50 Mb of email in/out of the
> firewall on a daily basis qualifies. I have a GUI'd security
> tool for doing exactly that.
> 
> These are the basic categories of email security incidents:
> 
>    o  employees just trying to get work done
>    o  employees working on their own jobs while within the firm
>    o  "Dumb & Dumber"
>    o  employees within their last two weeks of work (got a new job)
>    o  idiots (misc)
> 
> When I first turned on my (homegrown) email monitoring software
> at a brokerage firm with 7,000 employees, it picked up 38,000 lines
> of proprietary source code within the first three days.
> 
> After five months, it was over 400,000 lines of proprietary source code.
> 
> And that was just source code. (nor were any keywords used to spot source)
> 
> People will rob and expose your proprietary operating information
> left and right, as if they had the gawd-given right to do so.
> 
> And we kept telling employees it was monitored.
> 
> Anyone not monitoring many megabytes of firewall traffic
> is not performing much of a security role, beyond keeping
> the barbarians coming in the gateway.
> ---guy
> 
>    Just lipservice.
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to