I agree that ROI really isn't a good model for justifying network security costs.  If 
the customer has critical data that will cost the company dearly if lost, I present 
network security as an "insurance policy".  There is no real ROI on insurance, and you 
only need it when things go badly.  But if things do go badly and you don't have 
insurance, ....

I think this is a valid approach and see on a fairly regular basis where someone has 
attempted some level of suspicious activity.  Port scans, TFN probes and things like 
that mostly, but when I can show the firewall logs blocking this type of traffic, it 
helps to validate the cost.  Hackist did some probing, didn't find anything and gave 
up.  This is very worthwhile, I think.  If the firewall wasn't there, how far would 
they have gone?  

VPN is a different story.  VPN is a double hitter both as ROI and insurance.  It's 
cheaper than a dedicated WAN circuit AND it protects data.

-MJL

----------
From:   Geoff Gates[SMTP:[EMAIL PROTECTED]]
Sent:   Tuesday, April 18, 2000 8:40 AM
To:     [EMAIL PROTECTED]
Subject:        re: Off Topic: Upper Management decision making

Yes, it is certainly true that you must prove that the cost of recovering a 
compromised network is TREMENDOUS, to your upper management.  The only problems that 
we face
with network security is that there is no sound way to quantify what measures to 
protect a network will succeed.  Be careful when you present to your upper management 
the
suggestion that spending 40k, will save 100k in the future.

Any network security specialist knows that no matter what measures are taken to 
protect their network, they must cover every possible hole/exploit where an attacker 
need
only find one.  With the complexity of computer systems, it is nearly impossible to do 
this, and this should be made well known to management.  You must remember that it is
difficult to detect new attacks, since most of these are not incorporated into IDS's, 
Firewalls, etc.  In the end, the potential still exists that you may spend xx $$ on
security measures and still have your network compromised by an attacker costing an 
additional sum of money.  The key to point out to management would be that the 
potential
is significantly reduced, but who knows how to quantify this into a tangible metric.  
Luckily network security has been given much attention (PPD 63, Clinton's CIP, DDOS
attacks, etc.).  Thus you have some "scare tactics" to bring to bat when this is 
important.

Not to ramble further, but it is sad to point out that an overwhelming majority of 
attacks are generated on the inside.  It is here that Firewalls, Proxies, and general
measures usually fail completely, and these insiders may even have the passwords to 
your security gear.  I would make this known to management too, just don't make it look
so hopeless where management would come to the realization that it may cost too much, 
and that the risk may be worthwhile.

Geoff Gates
Network Engineer
Lockheed Martin, NE&SS

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to