Jon already pretty much covered the response to this - remote  
administration, viewing, and to be frank, we plug in internet  
connectivity to *everything* these days.

That said, I also think that we forget there are three parties in  
security - attacker, defender and user.  From the user's perspective,  
we appear to exist solely to pee in their wheaties.  There exist a  
good number of organizations who have ultimate users (doctors,  
generals, senior faculty, CEOs) who you *have* to provide what they  
want, regardless of how insecure it is.

On Oct 11, 2009, at 5:27 AM, Jim Murray wrote:

> Michael Collins wrote:
>> Heh,
>>
>> One of the fun exercises I like to spring on people is to play out  
>> the
>> following scenario: assume you've got an embedded system of some kind
>> being controlled by a windows 3.1 box.  Let's say it's doing  
>> something
>> like wrapping candybars or stamping plaques or wahtever, it's
>> piecework payment.  The machine gets 0wned, and while it's not doing
>> anything that's impacting you personally, it's contributing a couple
>> of kb/s to spamming or ddosing or other fun things.  Is it in your
>> interest to sacrifice the day, and the consequent profits involved in
>> fixing your box, to solve the problem or better to just let it run?
>
> My first question has to be 'What is such a device doing connected to
> the public internet in the first place?'. If it really MUST be  
> connected
> then it should be properly protected. If you they don't do that and  
> get
> 0wned then you deserve the costs and inconvenience of cleaning up the
> mess you made, it's a safe bet you'll be more careful in future.
>
>> The problem was given a more concrete example by a colleague who
>> pointed out that most medical hardware running on windows boxes is  
>> not
>> only certified for windows only, but specific *patchlevels*, and that
>> consequently these machines can get restored, taken down,  
>> reinstalled,
>> and put back on the net with known vulnerabilities because their
>> software is certified with vulnerabilities intact.
>
> If I were to find any critical piece of medical hardware connected to
> the public internet it'd be very concerned indeed. Surely best  
> practice
> dictates that clinical networks are kept isolated from the
> administrative networks & public internet?
>
> Jim.
>
> -- 
>      DigitalDaemons IT Services.
> ---------------------------------------
>   E-Mail : j...@digitaldaemons.co.uk
>       PGP Key ID : 0xB7066495
>

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to