> >--
> >Jason Dixon, RHCE
> 
> *sigh* I guess RHCE doesn't delve into the security aspects then eh ?

Look, I never intended to start a flame war or anything.

There are times and places where each approach has it's merits.

In my case, where I am a member of a military CERT, we have to be 
absolutely sure that our systems are secure.  This means that we have a 
rather involved response protocol, and part of it is retaining evidence, 
as Jason alluded to.

You also have to remember that we are forbidden from attempting to "trap" 
a hacker, since we are not law-enforcement.

So, basically, we will shut down the system and disconnect it from a 
network.  Then we'll make a full image of the drive, when possible, for 
forensic analysis.  Then we'll boot from a known-good CD to run some 
checks, etc.

When you are dealing with national security, it's not exactly "small/home 
office" applications.  I agree that it is labor intensive.  But if you are 
going to do security, the Department of Defense tells us military CERTS to 
"do it right or get the hell out of the way so somebody else can".

Ben



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to