Re: On the subject of security...

2013-04-23 Thread Kurt Buff
Sorry for the delay - many balls in the air...

On Thu, Apr 18, 2013 at 5:11 AM, Ben Scott mailvor...@gmail.com wrote:
 On Thu, Apr 18, 2013 at 12:53 AM, Kurt Buff kurt.b...@gmail.com wrote:
 Not that they're equivalent in power, but that each kind of account
 can do and has access is different and equally valuable.

   For the typical home user, which is what that comic is focused
 on[1], not so much.

 Root/Administrator is valuable because it can subvert the protections
 on, or directly access, the data that end-user accounts have, and
 end-user accounts because that's the actual money/IP resides.

   And for a home PC *THERE IS ONLY ONE USER*.

 [1] Note what's in the bubbles around the edges.

 Yes, I noted the bubbles. But a), even for home users, while there
 might be only one user, there should be *at least* n+1 users, where n
 is the number of individuals who actually use the machine, plus an
 administrator account ...

   You're still steadfastly refusing to go near the point.

   But, the multi-user at home question is a valid one, and involves a
 previously unstated assumption on both your part and mine.  I've been
 assuming dedicated personal hardware, because I know Randall has no
 children, is unmarried, and referred to his laptop, which is a
 dedicated personal machine.  So, my assumption is n=1.  With that in
 mind:

   Your statement about how an admin account can access the data of
 other user accounts goes directly to the heart of the problem Munroe
 is describing: The only other user account is Randall's.  The only
 data is the data in Randall's user account.

   This doesn't make the admin account worthless, because breaking into
 the admin account would enable breaking into Randall's user account.
 But it does mean breaking into the one is roughly equivalent to
 breaking into the other, in either direction.  A lot of
 people/security design treats the admin account a uniquely high-value
 asset, even in this scenario, which is a fallacy.  And this scenario
 may well be the most common scenario, although I lack the data to make
 that determination.

No, I don't agree here. Breaking into one account is definitely not
the rough equivalent of breaking into the other, or at least it
shouldn't be. Each must be protected (in many, but not all of, the
same ways), and each should be used only in ways that are germane to
its function. The user account shouldn't be used for anything but
user-type activities, not admin-type activities, and vice versa.

 ... given all of those bubbles, the end user
 is in a threat-rich environment, so must exercise the vigilance
 techniques I and others have described/prescribed, if they care about
 their data, privacy and finances.

   True but unremarkable.  Specifically: Not anything have to do with
 the comic.  You keep launching into this list of unrelated techniques
 like it has anything to do with the discussion.

   I could talk about DoD personnel security requirements, but it
 wouldn't be particularly pertinent.

I think it has everything to do with the comic, or at least my
understanding of the comic. What I'm reading from it is that he's
using poor web browsing techniques, and not protecting his personal
data via the mechanisms I've outlined, including different IDs and
passwords (and even different browsers) for different web sites, etc.

Perhaps you have a different understanding of the meaning of that
comic - if so, please provide me with illumination.

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: On the subject of security...

2013-04-23 Thread Kurt Buff
On Wed, Apr 17, 2013 at 7:52 PM, Ken Schaefer k...@adopenstatic.com wrote:
 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com]
 Subject: Re: On the subject of security...

 No running executables from untrusted sources, turn off scripting in
 my browsers, view all email as plain text, no remembering/caching of
 passwords in browsers, using a unique password per web site and per
 other accounts, regular clearing of cookies, no linking of accounts
 between web sites, running current AV, no browsing with elevated
 accounts, laptops have full disk encryption, etc., etc., etc.

 Without an evaluation of risks, this would be a complete waste of time for 
 most people IMHO.

 Sure - if you don't browse the Internet, share USB sticks, etc., you 
 probably don't need to do those things.

 But I do browse the internet, and I do share USB sticks. Yet I don't do most 
 of what you list above.

 Everything is about /management/ of risk, not 99.99% avoidance of risk.

You manage risk by taking countermeasures, I believe, not by ignoring them.

To me, your approach sounds like ignoring, not managing. But, as you
point out, it's a matter of what makes you comfortable.

 Just as people don’t live in impenetrable fortresses, and keep their money in 
 Fort Knox,
 it's not actually necessary (or even desirable IMHO) to do some of things you 
 do to
 have an acceptable level of risk. The marginal benefit from each additional 
 step you are
 taking vs. the cost to usability and time taken isn't worth it (again, IMHO)

Well, yes, of course. My firearms are in a safe, and so are my most
valuable, irreplaceable papers - which are just about none.

 I run as an admin on my personal machine. I don't bother reading all mail 
 in plain text,
 and I don’t full disk encrypt all my machines, and I don't clear my 
 cookies. I've got better
 things to do with my time, and if I focus on protecting my identity and 
 data instead, I'm
 probably just as likely as you to be safe.

 So, care to share how you protect your identity and data without any 
 technologies or processes?

 Let's be clear - I'm not saying I have no technology, and my strategy is to 
 rely on magic.

 I start by worrying about what my family needs/wants to be able to do, and 
 then what apps and
 data we need to do it, and then work out what the threats/risks are. You can 
 draw a parallel to
 business - info - technology architecture from TOGAF or similar framework 
 if you want.
 Malware and hackers getting into my home network is probably about half-way 
 down the list at the
 moment. Additionally, instead of inconveniencing end users with restrictions 
 on either user experience,
 I want technology to work in the background to protect us (if possible). So, 
 we use 802.1x for our
 wireless since we're all on an AD domain, and SOHO APs all support it now 
 (there's a guest wireless
 network for visitors), and I use centralised malware scanning on the Exchange 
 server. I'm researching
 some options for outsourcing the malware/junk scanning for incoming (it's a 
 pity that Postini doesn't
 seem to be available anymore)

 But things I worry about more are hardware failure, lightning strikes (had 
 two of those in two different
 homes), being burgled, having a fire or something else similar that destroys 
 things.

 The information I worry about protecting isn't just what's 
 electronic/digital, but also paper records,
 passports, birth certificates and so on.

 So, it's starting from a different starting point. It's not starting from 
 you should encrypt your disk, delete
 your cookies, run as a non-admin. It's starting from what types of 
 critical/important/throw-away data do
 I have in order to live/work/interact with friends, and then what are the 
 risks to that data, and what can I
 do about it. And weigh all that against usability

 So, I'm not particularly worried about someone getting access to the password 
 for the media centre PC's
 default user account. I'm more worried about that account somehow getting 
 logged out, and whoever is
 using our media centre not being able to log back in again. I mitigate the 
 risk of people knowing the
 password doing something bad by restricting what that account is allowed to 
 do. Likewise I want to be able
 to share things with my family overseas, bank online and do various other 
 things - at the same time without
 impacting my user experience significantly, so I take other measures to help 
 reduce risk: I get notifications
 for purchases on my CCs over a certain amount. Most of my banks require (or 
 at least offer) 2FA for
 authentication now. Etc.

While I agree that the account(s) on your media server aren't a big
deal, that's only to the extent that they don't have the same
passwords as accounts on other machines, or have access to valuable
data elsewhere.

2FA is good for your financial accounts, and also good backups and
physical protection - all of which I strive for as well. I've had my

RE: On the subject of security...

2013-04-23 Thread Ken Schaefer
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com] 
Subject: Re: On the subject of security...

 Everything is about /management/ of risk, not 99.99% avoidance of risk.

 You manage risk by taking countermeasures, I believe, not by ignoring them. 

Where do you get this framework from?

Most risk management people I've talked to would say that all the below are 
legitimate responses to risks
a) mitigate
b) transfer
c) accept
d) avoid

 OTOH, I think you seriously underestimate the risks of web browsing to your 
 finances, identity 
 and reputation, and also the costs of repairing them.

OK - please educate us on these risks and costs.

My understanding is that most fraud and identity theft occurs offline. Secondly 
some of the things you do (like encrypt drives) aren't going to help with 
dangerous web browsing habits.

So, what's the real risks of browing the web? I've never seen any real research 
on this.

Cheers
Ken


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: On the subject of security...

2013-04-23 Thread Ken Schaefer




-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Subject: Re: On the subject of security...



 I think it has everything to do with the comic, or at least my understanding 
 of the comic. What I'm

 reading from it is that he's using poor web browsing techniques, and not 
 protecting his personal

 data via the mechanisms I've outlined, including different IDs and passwords 
 (and even

 different browsers) for different web sites, etc.



 Perhaps you have a different understanding of the meaning of that comic - if 
 so,

 please provide me with illumination.



The text in the comic does state if someone steals my computer whilst I am 
logged in...” in which case, disk encryption, multiple passwords, multiple 
browsers etc. would mostly be useless – the assumption being that the user is 
logged into these sites or apps already.



I think explainxkcd.com does a good job of explaining the comic (emphasis 
added):

http://www.explainxkcd.com/wiki/index.php?title=1200



quote

Computer operating systems were initially written for the business environment. 
Thus they were made to be accessible to multiple employees, or users, but only 
fully accessible to administrators (or admins). Regular users can access and 
use programs on the computer, but only the admin is allowed to make changes to 
how the computer runs. This same split level of security continues to this day, 
even in privately owned, or home, computers.

The joke here is that the most important things on a computer are no longer the 
programs that it runs, but the private personal data it accesses (usually 
online). Anyone who wished to do real mischief on an active computer could do 
considerable damage without ever caring what the admin password was. The admin 
password, in effect, now guards a vault no one cares about.

This comic pokes fun at the authorization mechanisms surrounding most operating 
systems' administrator accounts. It makes the argument that the user's data is 
more valuable than the integrity of the system. (This is arguably true for most 
personal systems, although it is probably not true in a shared-server setup, 
where a system compromise could lead to the exposure of many users' data.)

Essentially, once a user is logged in, he or she can typically access all of 
his or her data without any further restriction. Modifying the operating system 
(for example, to install drivers) requires a separate password.

/quote

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: On the subject of security...

2013-04-18 Thread Ben Scott
On Thu, Apr 18, 2013 at 12:53 AM, Kurt Buff kurt.b...@gmail.com wrote:
 Not that they're equivalent in power, but that each kind of account
 can do and has access is different and equally valuable.

   For the typical home user, which is what that comic is focused
 on[1], not so much.

 Root/Administrator is valuable because it can subvert the protections
 on, or directly access, the data that end-user accounts have, and
 end-user accounts because that's the actual money/IP resides.

   And for a home PC *THERE IS ONLY ONE USER*.

 [1] Note what's in the bubbles around the edges.

 Yes, I noted the bubbles. But a), even for home users, while there
 might be only one user, there should be *at least* n+1 users, where n
 is the number of individuals who actually use the machine, plus an
 administrator account ...

  You're still steadfastly refusing to go near the point.

  But, the multi-user at home question is a valid one, and involves a
previously unstated assumption on both your part and mine.  I've been
assuming dedicated personal hardware, because I know Randall has no
children, is unmarried, and referred to his laptop, which is a
dedicated personal machine.  So, my assumption is n=1.  With that in
mind:

  Your statement about how an admin account can access the data of
other user accounts goes directly to the heart of the problem Munroe
is describing: The only other user account is Randall's.  The only
data is the data in Randall's user account.

  This doesn't make the admin account worthless, because breaking into
the admin account would enable breaking into Randall's user account.
But it does mean breaking into the one is roughly equivalent to
breaking into the other, in either direction.  A lot of
people/security design treats the admin account a uniquely high-value
asset, even in this scenario, which is a fallacy.  And this scenario
may well be the most common scenario, although I lack the data to make
that determination.

 ... given all of those bubbles, the end user
 is in a threat-rich environment, so must exercise the vigilance
 techniques I and others have described/prescribed, if they care about
 their data, privacy and finances.

  True but unremarkable.  Specifically: Not anything have to do with
the comic.  You keep launching into this list of unrelated techniques
like it has anything to do with the discussion.

  I could talk about DoD personnel security requirements, but it
wouldn't be particularly pertinent.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: On the subject of security...

2013-04-18 Thread Andrew S. Baker
Generally, I agree with your point.   Risk management is a holistic
endeavor, and when we forget that, we get hung up on technicalities that
don't help us achieve the end goal.

Protecting root access in a system does have some value when it comes to
persistence of malware. Malware that is confined to userland is easier to
detect and uproot than malware that makes it to a deeper level.

Your key point about the safety of data in userland cannot be denied,
however.  But, it's not like there aren't tools for that -- it's just that
people are as annoyed about using them as they are with UAC, etc.

Example:  Too many people share passwords across multiple systems/services.
 These same people tend not to use password managers.  The use of the
latter would go a long way to curtailing the mistake of doing the former.

Similarly, very few people who could benefit from it actually bother to
use encryption.


I think that the bigger problem is that most people don't realize the
importance and criticality of their data until it is lost...






*ASB
**http://XeeMe.com/AndrewBaker* http://xeeme.com/AndrewBaker*
**Providing Virtual CIO Services (IT Operations  Information Security) for
the SMB market…***




On Wed, Apr 17, 2013 at 3:27 PM, Ben Scott mailvor...@gmail.com wrote:

 On Wed, Apr 17, 2013 at 2:43 PM, Michael B. Smith mich...@smithcons.com
 wrote:
  IOW: Security is for the MANAGEMENT of risk and MITIGATION of same. For
 real
  world systems, and usage of them, there is no such thing as perfect
 security.

   That's true, too, but the point Munroe is trying to make is that a
 lot of people lose track of the forest for the trees.  They get so
 caught up in protecting the computer that they forget why they're
 protecting it.

   On my home PC, most of the the software I use is free and
 unremarkable.  I could rebuild the software configuration from scratch
 in a matter of hours.  Why do I care about protecting *that*?

   I don't.  I want to protect my photos, files, bank account, Facebook
 account, etc., etc.  All of which are tied into my user account and
 who-knows-how-many third-party web sites.  They don't much care about
 my admin account.

   But a lot of computer security people focus on protecting the system
 privileged account.  For example, I've gotten into strong arguments
 with *nix weenies about how protecting the root account is the most
 important thing on a system, and that's the fundamental flaw in
 Microsoft Windows, or some such thing.  They don't get that the data
 in my user account is a lot more valuable than the software install.
 They don't get that a worm can propagate from my user account just as
 easily.  And as I'm the only user of my home PC, I'm not even
 protecting other users from me.  Yah, I protect the root account, but
 only as a means to helping protect the stuff I care about.

   I've had the exact same discussion about Windows and UAC.  On this
 forum, in fact.  If UAC works perfectly, it successfully protects an
 admin account on a throw-away home PC with one user.  Meanwhile, the
 malware is quite content to delete/steal all the user's data from
 userland, and then propagate to other PCs, again from userland.  It's
 mildly useful in helping prevent a reinstall of a bunch of software,
 but that's not the high value asset.

   (Protecting system access is rather more relevant in business, where
 you've got more than one level of privilege.)

 -- Ben

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: On the subject of security...

2013-04-18 Thread Andrew S. Baker
Ah, but Ken, you've done a risk assessment. :)

Without one, there is no way to know what your status is, and what steps
should be taken (or avoided) to make it better.

This is just as true for consumers as for corporations, and often just as
ignored.





*ASB
**http://XeeMe.com/AndrewBaker* http://xeeme.com/AndrewBaker*
**Providing Virtual CIO Services (IT Operations  Information Security) for
the SMB market…***




On Wed, Apr 17, 2013 at 7:29 PM, Ken Schaefer k...@adopenstatic.com wrote:

 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com]
 Sent: Thursday, 18 April 2013 6:08 AM
 To: NT System Admin Issues
 Subject: Re: On the subject of security...

  If that's the case, then he didn't make his point at all clear.
 ...
  True again - and again unremarkable. My point is that you have to use
 the same methods to
  protect unprivileged accounts as you do root/administrator.
  ...
  That's the import of my remarks about screensavers, FDE, not caching
 passwords
  for web sites in browsers, etc. - it's all about protecting the data;
 that which resides
  on the machine, and that which resides on teh intarwebs.

 If anyone's being unclear here, I think it's you.

 My reading of your comments is that a lot of your suggestions are geared
 towards preventing access to the system.

 All your suggestions about encrypting disks, having screen savers etc. are
 overkill if all my data is burnt to CDs. I'm better off investing in a safe
 to house them. Additionally, if my only PC is the one sitting in my living
 room, then when someone has got access to that machine (by breaking into my
 house), then a lack of password protected screensaver, or the fact that the
 password to the machine is on the bottom of the keyboard, is probably the
 least of my problems.

 Security is about managing risk: identify what the threats are, and the
 mitigate, transfer, accept etc. Security is not a checklist of technologies
 and processes.

  I protect all of my accounts, privileged or not, in the same ways, and
  have been doing so for so long that it's completely natural to me. It
  just feels unnatural not to do so.
 
  No running executables from untrusted sources, turn off scripting in
  my browsers, view all email as plain text, no remembering/caching of
  passwords in browsers, using a unique password per web site and per
  other accounts, regular clearing of cookies, no linking of accounts
  between web sites, running current AV, no browsing with elevated
  accounts, laptops have full disk encryption, etc., etc., etc.

 Without an evaluation of risks, this would be a complete waste of time for
 most people IMHO.

 I run as an admin on my personal machine. I don't bother reading all mail
 in plain text, and I don’t full disk encrypt all my machines, and I don't
 clear my cookies. I've got better things to do with my time, and if I focus
 on protecting my identity and data instead, I'm probably just as likely as
 you to be safe.

 Cheers
 Ken

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: On the subject of security...

2013-04-18 Thread Ben Scott
On Thu, Apr 18, 2013 at 11:16 AM, Andrew S. Baker asbz...@gmail.com wrote:
 Protecting root access in a system does have some value when it comes to
 persistence of malware. Malware that is confined to userland is easier to
 detect and uproot than malware that makes it to a deeper level.

  There is certainly some value to the admin account, even on a
single-user dedicated device.  I certainly don't advocate ignoring
that.  :-)

 I think that the bigger problem is that most people don't realize the
 importance and criticality of their data until it is lost...

  No argument there.

  For that matter: s/their data/anything/

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: On the subject of security...

2013-04-17 Thread Kurt Buff
On Wed, Apr 17, 2013 at 1:59 AM, James Rankin kz2...@googlemail.com wrote:
 ...today's XKCD sums it up nicely

 http://xkcd.com/1200/

So, yeah, that's true if you don't use full disk encryption, or a
password on your computer/domain account and a locked screensaver with
a reasonable timeout, and if you have your browser save your password
for all of your web sites, or have them in a text file on your
desktop, or similar ridiculous practices.

Oh, yeah - you should also turn off your 1394 port in BIOS.

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: On the subject of security...

2013-04-17 Thread Ben Scott
On Wed, Apr 17, 2013 at 2:29 PM, Kurt Buff kurt.b...@gmail.com wrote:
 On Wed, Apr 17, 2013 at 1:59 AM, James Rankin kz2...@googlemail.com wrote:
 ...today's XKCD sums it up nicely

 http://xkcd.com/1200/

 So, yeah, that's true if you don't use full disk encryption, or a
 password on your computer/domain account ...

  You're missing the point.

  A lot of devs and admins fall into the trap of protecting the system
and forgetting that there's a reason why we have the system in the
first place.  I ultimately don't care about my root account.
Protecting it is just a means to an end -- protecting my data, most of
which lives in my user account.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: On the subject of security...

2013-04-17 Thread Kurt Buff
On Wed, Apr 17, 2013 at 11:36 AM, Ben Scott mailvor...@gmail.com wrote:
 On Wed, Apr 17, 2013 at 2:29 PM, Kurt Buff kurt.b...@gmail.com wrote:
 On Wed, Apr 17, 2013 at 1:59 AM, James Rankin kz2...@googlemail.com wrote:
 ...today's XKCD sums it up nicely

 http://xkcd.com/1200/

 So, yeah, that's true if you don't use full disk encryption, or a
 password on your computer/domain account ...

   You're missing the point.

   A lot of devs and admins fall into the trap of protecting the system
 and forgetting that there's a reason why we have the system in the
 first place.  I ultimately don't care about my root account.
 Protecting it is just a means to an end -- protecting my data, most of
 which lives in my user account.

No, I'm not missing the point. Protecting the end-user account and its
data is what those techniques are for - and they also need to be
applied to the root/administrator account.

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: On the subject of security...

2013-04-17 Thread Michael B. Smith
IOW: Security is for the MANAGEMENT of risk and MITIGATION of same. For real 
world systems, and usage of them, there is no such thing as perfect security.

-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com] 
Sent: Wednesday, April 17, 2013 2:36 PM
To: NT System Admin Issues
Subject: Re: On the subject of security...

On Wed, Apr 17, 2013 at 2:29 PM, Kurt Buff kurt.b...@gmail.com wrote:
 On Wed, Apr 17, 2013 at 1:59 AM, James Rankin kz2...@googlemail.com wrote:
 ...today's XKCD sums it up nicely

 http://xkcd.com/1200/

 So, yeah, that's true if you don't use full disk encryption, or a 
 password on your computer/domain account ...

  You're missing the point.

  A lot of devs and admins fall into the trap of protecting the system and 
forgetting that there's a reason why we have the system in the first place.  I 
ultimately don't care about my root account.
Protecting it is just a means to an end -- protecting my data, most of which 
lives in my user account.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: On the subject of security...

2013-04-17 Thread Ben Scott
On Wed, Apr 17, 2013 at 2:42 PM, Kurt Buff kurt.b...@gmail.com wrote:
 http://xkcd.com/1200/
 So, yeah, that's true if you don't use full disk encryption, or a
   You're missing the point.
 No, I'm not missing the point.

  Well, then, you're apparently choosing not to discuss it, then.  For
an email conversation, they're equivalent.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: On the subject of security...

2013-04-17 Thread Ben Scott
On Wed, Apr 17, 2013 at 2:43 PM, Michael B. Smith mich...@smithcons.com wrote:
 IOW: Security is for the MANAGEMENT of risk and MITIGATION of same. For real
 world systems, and usage of them, there is no such thing as perfect security.

  That's true, too, but the point Munroe is trying to make is that a
lot of people lose track of the forest for the trees.  They get so
caught up in protecting the computer that they forget why they're
protecting it.

  On my home PC, most of the the software I use is free and
unremarkable.  I could rebuild the software configuration from scratch
in a matter of hours.  Why do I care about protecting *that*?

  I don't.  I want to protect my photos, files, bank account, Facebook
account, etc., etc.  All of which are tied into my user account and
who-knows-how-many third-party web sites.  They don't much care about
my admin account.

  But a lot of computer security people focus on protecting the system
privileged account.  For example, I've gotten into strong arguments
with *nix weenies about how protecting the root account is the most
important thing on a system, and that's the fundamental flaw in
Microsoft Windows, or some such thing.  They don't get that the data
in my user account is a lot more valuable than the software install.
They don't get that a worm can propagate from my user account just as
easily.  And as I'm the only user of my home PC, I'm not even
protecting other users from me.  Yah, I protect the root account, but
only as a means to helping protect the stuff I care about.

  I've had the exact same discussion about Windows and UAC.  On this
forum, in fact.  If UAC works perfectly, it successfully protects an
admin account on a throw-away home PC with one user.  Meanwhile, the
malware is quite content to delete/steal all the user's data from
userland, and then propagate to other PCs, again from userland.  It's
mildly useful in helping prevent a reinstall of a bunch of software,
but that's not the high value asset.

  (Protecting system access is rather more relevant in business, where
you've got more than one level of privilege.)

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: On the subject of security...

2013-04-17 Thread Kurt Buff
On Wed, Apr 17, 2013 at 12:06 PM, Ben Scott mailvor...@gmail.com wrote:
 On Wed, Apr 17, 2013 at 2:42 PM, Kurt Buff kurt.b...@gmail.com wrote:
 http://xkcd.com/1200/
 So, yeah, that's true if you don't use full disk encryption, or a
   You're missing the point.
 No, I'm not missing the point.

   Well, then, you're apparently choosing not to discuss it, then.  For
 an email conversation, they're equivalent.

 -- Ben

As you wish, Buttercup.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: On the subject of security...

2013-04-17 Thread Kurt Buff
On Wed, Apr 17, 2013 at 12:27 PM, Ben Scott mailvor...@gmail.com wrote:
 On Wed, Apr 17, 2013 at 2:43 PM, Michael B. Smith mich...@smithcons.com 
 wrote:
 IOW: Security is for the MANAGEMENT of risk and MITIGATION of same. For real
 world systems, and usage of them, there is no such thing as perfect security.

   That's true, too, but the point Munroe is trying to make is that a
 lot of people lose track of the forest for the trees.  They get so
 caught up in protecting the computer that they forget why they're
 protecting it.

If that's the case, then he didn't make his point at all clear.

   On my home PC, most of the the software I use is free and
 unremarkable.  I could rebuild the software configuration from scratch
 in a matter of hours.  Why do I care about protecting *that*?

   I don't.  I want to protect my photos, files, bank account, Facebook
 account, etc., etc.  All of which are tied into my user account and
 who-knows-how-many third-party web sites.  They don't much care about
 my admin account.

True, and unremarkable.

   But a lot of computer security people focus on protecting the system
 privileged account.  For example, I've gotten into strong arguments
 with *nix weenies about how protecting the root account is the most
 important thing on a system, and that's the fundamental flaw in
 Microsoft Windows, or some such thing.  They don't get that the data
 in my user account is a lot more valuable than the software install.
 They don't get that a worm can propagate from my user account just as
 easily.  And as I'm the only user of my home PC, I'm not even
 protecting other users from me.  Yah, I protect the root account, but
 only as a means to helping protect the stuff I care about.

True again - and again unremarkable. My point is that you have to use
the same methods to protect unprivileged accounts as you do
root/administrator.

Not that they're equivalent in power, but that each kind of account
can do and has access is different and equally valuable.
Root/Administrator is valuable because it can subvert the protections
on, or directly access, the data that end-user accounts have, and
end-user accounts because that's the actual money/IP resides.

That's the import of my remarks about screensavers, FDE, not caching
passwords for web sites in browsers, etc. - it's all about protecting
the data; that which resides on the machine, and that which resides on
teh intarwebs.

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


Re: On the subject of security...

2013-04-17 Thread Jonathan Link
On Wed, Apr 17, 2013 at 4:07 PM, Kurt Buff kurt.b...@gmail.com wrote:

 On Wed, Apr 17, 2013 at 12:27 PM, Ben Scott mailvor...@gmail.com wrote:
  On Wed, Apr 17, 2013 at 2:43 PM, Michael B. Smith mich...@smithcons.com
 wrote:
  IOW: Security is for the MANAGEMENT of risk and MITIGATION of same. For
 real
  world systems, and usage of them, there is no such thing as perfect
 security.
 
That's true, too, but the point Munroe is trying to make is that a
  lot of people lose track of the forest for the trees.  They get so
  caught up in protecting the computer that they forget why they're
  protecting it.

 If that's the case, then he didn't make his point at all clear.

It was pretty clear to me, and coincidentally (or not!) his image looks
like a tree.  Nevermind the fact that most professionals are saying don't
run as admin.  OK, so they're not.  Does that mean they are protected?
 Protected from what?  Not getting a more pervasive infection, sure.  But
malware writers are dropping the .exe's in userland and doing stuff with
the data they access.  How do you protect that data, when the person who's
been infected, is the person who needs access to the data?

Thought it was pretty clear, to be honest.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: On the subject of security...

2013-04-17 Thread Kurt Buff
On Wed, Apr 17, 2013 at 1:19 PM, Jonathan Link jonathan.l...@gmail.com wrote:
 On Wed, Apr 17, 2013 at 4:07 PM, Kurt Buff kurt.b...@gmail.com wrote:

 On Wed, Apr 17, 2013 at 12:27 PM, Ben Scott mailvor...@gmail.com wrote:
  On Wed, Apr 17, 2013 at 2:43 PM, Michael B. Smith
  mich...@smithcons.com wrote:
  IOW: Security is for the MANAGEMENT of risk and MITIGATION of same. For
  real
  world systems, and usage of them, there is no such thing as perfect
  security.
 
That's true, too, but the point Munroe is trying to make is that a
  lot of people lose track of the forest for the trees.  They get so
  caught up in protecting the computer that they forget why they're
  protecting it.

 If that's the case, then he didn't make his point at all clear.

 It was pretty clear to me, and coincidentally (or not!) his image looks like
 a tree.  Nevermind the fact that most professionals are saying don't run as
 admin.  OK, so they're not.  Does that mean they are protected?  Protected
 from what?  Not getting a more pervasive infection, sure.  But malware
 writers are dropping the .exe's in userland and doing stuff with the data
 they access.  How do you protect that data, when the person who's been
 infected, is the person who needs access to the data?

 Thought it was pretty clear, to be honest.

Apparently I'm dense, then.

I protect all of my accounts, privileged or not, in the same ways, and
have been doing so for so long that it's completely natural to me. It
just feels unnatural not to do so.

No running executables from untrusted sources, turn off scripting in
my browsers, view all email as plain text, no remembering/caching of
passwords in browsers, using a unique password per web site and per
other accounts, regular clearing of cookies, no linking of accounts
between web sites, running current AV, no browsing with elevated
accounts, laptops have full disk encryption, etc., etc., etc.

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: On the subject of security...

2013-04-17 Thread Ziots, Edward
I agree, without the data you have nothing, protecting the data is what its 
about. Why have controls in systems if you aren't trying to protect the crown 
jewels which is the data in which your organization/business used to get its 
job/mission accomplished. 

Z

Edward E. Ziots, CISSP, CISA, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org
Work:401-444-9081


This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.



-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com] 
Sent: Wednesday, April 17, 2013 2:43 PM
To: NT System Admin Issues
Subject: Re: On the subject of security...

On Wed, Apr 17, 2013 at 11:36 AM, Ben Scott mailvor...@gmail.com wrote:
 On Wed, Apr 17, 2013 at 2:29 PM, Kurt Buff kurt.b...@gmail.com wrote:
 On Wed, Apr 17, 2013 at 1:59 AM, James Rankin kz2...@googlemail.com wrote:
 ...today's XKCD sums it up nicely

 http://xkcd.com/1200/

 So, yeah, that's true if you don't use full disk encryption, or a 
 password on your computer/domain account ...

   You're missing the point.

   A lot of devs and admins fall into the trap of protecting the system 
 and forgetting that there's a reason why we have the system in the 
 first place.  I ultimately don't care about my root account.
 Protecting it is just a means to an end -- protecting my data, most of 
 which lives in my user account.

No, I'm not missing the point. Protecting the end-user account and its data is 
what those techniques are for - and they also need to be applied to the 
root/administrator account.

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: On the subject of security...

2013-04-17 Thread Jonathan Link
You do that.  Do you enforce that down to your users?  All of that?
What is an untrusted source?


On Wed, Apr 17, 2013 at 4:42 PM, Kurt Buff kurt.b...@gmail.com wrote:

 On Wed, Apr 17, 2013 at 1:19 PM, Jonathan Link jonathan.l...@gmail.com
 wrote:
  On Wed, Apr 17, 2013 at 4:07 PM, Kurt Buff kurt.b...@gmail.com wrote:
 
  On Wed, Apr 17, 2013 at 12:27 PM, Ben Scott mailvor...@gmail.com
 wrote:
   On Wed, Apr 17, 2013 at 2:43 PM, Michael B. Smith
   mich...@smithcons.com wrote:
   IOW: Security is for the MANAGEMENT of risk and MITIGATION of same.
 For
   real
   world systems, and usage of them, there is no such thing as perfect
   security.
  
 That's true, too, but the point Munroe is trying to make is that a
   lot of people lose track of the forest for the trees.  They get so
   caught up in protecting the computer that they forget why they're
   protecting it.
 
  If that's the case, then he didn't make his point at all clear.
 
  It was pretty clear to me, and coincidentally (or not!) his image looks
 like
  a tree.  Nevermind the fact that most professionals are saying don't run
 as
  admin.  OK, so they're not.  Does that mean they are protected?
  Protected
  from what?  Not getting a more pervasive infection, sure.  But malware
  writers are dropping the .exe's in userland and doing stuff with the data
  they access.  How do you protect that data, when the person who's been
  infected, is the person who needs access to the data?
 
  Thought it was pretty clear, to be honest.

 Apparently I'm dense, then.

 I protect all of my accounts, privileged or not, in the same ways, and
 have been doing so for so long that it's completely natural to me. It
 just feels unnatural not to do so.

 No running executables from untrusted sources, turn off scripting in
 my browsers, view all email as plain text, no remembering/caching of
 passwords in browsers, using a unique password per web site and per
 other accounts, regular clearing of cookies, no linking of accounts
 between web sites, running current AV, no browsing with elevated
 accounts, laptops have full disk encryption, etc., etc., etc.

 Kurt

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: On the subject of security...

2013-04-17 Thread Ken Schaefer
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com] 
Sent: Thursday, 18 April 2013 6:08 AM
To: NT System Admin Issues
Subject: Re: On the subject of security...

 If that's the case, then he didn't make his point at all clear.
...
 True again - and again unremarkable. My point is that you have to use the 
 same methods to 
 protect unprivileged accounts as you do root/administrator.
 ...
 That's the import of my remarks about screensavers, FDE, not caching 
 passwords 
 for web sites in browsers, etc. - it's all about protecting the data; that 
 which resides 
 on the machine, and that which resides on teh intarwebs.

If anyone's being unclear here, I think it's you.

My reading of your comments is that a lot of your suggestions are geared 
towards preventing access to the system. 

All your suggestions about encrypting disks, having screen savers etc. are 
overkill if all my data is burnt to CDs. I'm better off investing in a safe to 
house them. Additionally, if my only PC is the one sitting in my living room, 
then when someone has got access to that machine (by breaking into my house), 
then a lack of password protected screensaver, or the fact that the password to 
the machine is on the bottom of the keyboard, is probably the least of my 
problems.

Security is about managing risk: identify what the threats are, and the 
mitigate, transfer, accept etc. Security is not a checklist of technologies and 
processes. 

 I protect all of my accounts, privileged or not, in the same ways, and
 have been doing so for so long that it's completely natural to me. It
 just feels unnatural not to do so.

 No running executables from untrusted sources, turn off scripting in
 my browsers, view all email as plain text, no remembering/caching of
 passwords in browsers, using a unique password per web site and per
 other accounts, regular clearing of cookies, no linking of accounts
 between web sites, running current AV, no browsing with elevated
 accounts, laptops have full disk encryption, etc., etc., etc.

Without an evaluation of risks, this would be a complete waste of time for most 
people IMHO.

I run as an admin on my personal machine. I don't bother reading all mail in 
plain text, and I don’t full disk encrypt all my machines, and I don't clear 
my cookies. I've got better things to do with my time, and if I focus on 
protecting my identity and data instead, I'm probably just as likely as you to 
be safe.

Cheers
Ken

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: On the subject of security...

2013-04-17 Thread Kurt Buff
I would enforce most of it if policy allowed, but in the absence of
any written policy (which is my current situation), I can't. Were it
in my power to actually set policy, things would be much different.

At the very least, I'd love to be able to implement the top 4 controls
- patch the OS, patch the applications, remove administrator access
from end users and only allow whitelisted applications (of which we do
a good job on the first, a mediocre job on the second, and get a flat
failure on the last two - I'm in the process of improving the second
by getting Adobe and Java patching up to speed). If I could have just
those, life would be 10 times easier than it is now.

All I can do is educate, and since I'm mostly limited to that, the
effort is basically futile, because using the Internet for most folks
is like leaving a three year old within sight of an active quarry with
no fences - they don't have the skills or judgement to play safely in
the field next to it and not be attracted to (or to navigate) the
cliffs, ponds and heavy machinery in the quarry, because they lack the
experience and and training that most of us on this list have
acquired.

For instance, on trusted source - I've learned that downloading
software from CNET or other repositories is a great way to get pwned,
yet staff keep downloading and installing random software onto
machines because, well, the gods only know why, really - nothing
they've ever said to me makes any sense as a reason for installing the
multitudinous crap I've seen. Ditto for user interaction with any
number of other sources of data, whether nominally executable or not,
web sites most especially included.

So, basically, any source is untrusted until I've personally vetted
it, and feel comfortable with it.

Likewise on leaving scripting on by default in browsers. Most
commercial web sites use third party resources to track and advertise
and provide rich experience. None of that is trusted until I've
personally experienced it and and played with it for a while. In most
cases, if the site uses its own CDN, I'll whitelist that CDN for that
web site. Other than that, not so much.

The best I can do when someone has a pwned machine is say sucks to be
you - if you paid attention when I was talking it wouldn't have
happened, then wipe their machines and let them start over, after
asking them a few questions to see if I can figure out how it happened
and tell them not to do that anymore - which they promptly ignore.

The battle is lost - or at least it is until management says we can
try to win it. The most I can safely say is that my accounts, and the
computers on which I'm the sole operator, are far less likely to be
compromised than end-user accounts and computers.

Frustrating, but true...

Kurt

On Wed, Apr 17, 2013 at 3:48 PM, Jonathan Link jonathan.l...@gmail.com wrote:
 You do that.  Do you enforce that down to your users?  All of that?
 What is an untrusted source?


 On Wed, Apr 17, 2013 at 4:42 PM, Kurt Buff kurt.b...@gmail.com wrote:

 On Wed, Apr 17, 2013 at 1:19 PM, Jonathan Link jonathan.l...@gmail.com
 wrote:
  On Wed, Apr 17, 2013 at 4:07 PM, Kurt Buff kurt.b...@gmail.com wrote:
 
  On Wed, Apr 17, 2013 at 12:27 PM, Ben Scott mailvor...@gmail.com
  wrote:
   On Wed, Apr 17, 2013 at 2:43 PM, Michael B. Smith
   mich...@smithcons.com wrote:
   IOW: Security is for the MANAGEMENT of risk and MITIGATION of same.
   For
   real
   world systems, and usage of them, there is no such thing as perfect
   security.
  
 That's true, too, but the point Munroe is trying to make is that a
   lot of people lose track of the forest for the trees.  They get so
   caught up in protecting the computer that they forget why they're
   protecting it.
 
  If that's the case, then he didn't make his point at all clear.
 
  It was pretty clear to me, and coincidentally (or not!) his image looks
  like
  a tree.  Nevermind the fact that most professionals are saying don't run
  as
  admin.  OK, so they're not.  Does that mean they are protected?
  Protected
  from what?  Not getting a more pervasive infection, sure.  But malware
  writers are dropping the .exe's in userland and doing stuff with the
  data
  they access.  How do you protect that data, when the person who's been
  infected, is the person who needs access to the data?
 
  Thought it was pretty clear, to be honest.

 Apparently I'm dense, then.

 I protect all of my accounts, privileged or not, in the same ways, and
 have been doing so for so long that it's completely natural to me. It
 just feels unnatural not to do so.

 No running executables from untrusted sources, turn off scripting in
 my browsers, view all email as plain text, no remembering/caching of
 passwords in browsers, using a unique password per web site and per
 other accounts, regular clearing of cookies, no linking of accounts
 between web sites, running current AV, no browsing with elevated
 accounts, laptops have full disk encryption, etc., etc., 

Re: On the subject of security...

2013-04-17 Thread Kurt Buff
On Wed, Apr 17, 2013 at 4:29 PM, Ken Schaefer k...@adopenstatic.com wrote:
 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com]
 Sent: Thursday, 18 April 2013 6:08 AM
 To: NT System Admin Issues
 Subject: Re: On the subject of security...

 If that's the case, then he didn't make his point at all clear.
 ...
 True again - and again unremarkable. My point is that you have to use the 
 same methods to
 protect unprivileged accounts as you do root/administrator.
 ...
 That's the import of my remarks about screensavers, FDE, not caching 
 passwords
 for web sites in browsers, etc. - it's all about protecting the data; that 
 which resides
 on the machine, and that which resides on teh intarwebs.

 If anyone's being unclear here, I think it's you.

 My reading of your comments is that a lot of your suggestions are geared 
 towards preventing access to the system.

A lot - but not all of.

 All your suggestions about encrypting disks, having screen savers etc. are 
 overkill if all my data is burnt to CDs. I'm better off investing in a safe 
 to house them.

If all of your data is burned to CD, you still have to stick that CD
into your reader, and if your machine is compromised, it will still be
read and exfiltrated.

Additionally, if my only PC is the one sitting in my living room, then when 
someone has got access to that machine (by breaking into my house), then a 
lack of password protected screensaver, or the fact that the password to the 
machine is on the bottom of the keyboard, is probably the least of my problems.

True. But they are pretty much required on a laptop that you actually
take out of the house, not so? And, if you're going to practice that
kind of security on your laptop, it's far easier to keep in the habit
of doing it on all of your machines - and nearly mandatory if you have
kids who have physical access, I might add

 Security is about managing risk: identify what the threats are, and the 
 mitigate, transfer, accept etc. Security is not a checklist of technologies 
 and processes.

You manage your risks with those technologies and processes, though, don't you?

 I protect all of my accounts, privileged or not, in the same ways, and
 have been doing so for so long that it's completely natural to me. It
 just feels unnatural not to do so.

 No running executables from untrusted sources, turn off scripting in
 my browsers, view all email as plain text, no remembering/caching of
 passwords in browsers, using a unique password per web site and per
 other accounts, regular clearing of cookies, no linking of accounts
 between web sites, running current AV, no browsing with elevated
 accounts, laptops have full disk encryption, etc., etc., etc.

 Without an evaluation of risks, this would be a complete waste of time for 
 most people IMHO.

Sure - if you don't browse the Internet, share USB sticks, etc., you
probably don't need to do those things.

 I run as an admin on my personal machine. I don't bother reading all mail in 
 plain text, and I don’t full disk encrypt all my machines, and I don't 
 clear my cookies. I've got better things to do with my time, and if I focus 
 on protecting my identity and data instead, I'm probably just as likely as 
 you to be safe.

So, care to share how you protect your identity and data without any
technologies or processes?

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: On the subject of security...

2013-04-17 Thread Ben Scott
On Wed, Apr 17, 2013 at 4:07 PM, Kurt Buff kurt.b...@gmail.com wrote:
 My point is that you have to use
 the same methods to protect unprivileged accounts as you do
 root/administrator.

  True and unremarkable.

  There, I did it, too.  See how that fails to contribute to the discussion?

 Not that they're equivalent in power, but that each kind of account
 can do and has access is different and equally valuable.

  For the typical home user, which is what that comic is focused
on[1], not so much.

 Root/Administrator is valuable because it can subvert the protections
 on, or directly access, the data that end-user accounts have, and
 end-user accounts because that's the actual money/IP resides.

  And for a home PC *THERE IS ONLY ONE USER*.

-- Ben

[1] Note what's in the bubbles around the edges.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: On the subject of security...

2013-04-17 Thread Ken Schaefer
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com] 
Subject: Re: On the subject of security...

 No running executables from untrusted sources, turn off scripting in 
 my browsers, view all email as plain text, no remembering/caching of 
 passwords in browsers, using a unique password per web site and per 
 other accounts, regular clearing of cookies, no linking of accounts 
 between web sites, running current AV, no browsing with elevated 
 accounts, laptops have full disk encryption, etc., etc., etc.

 Without an evaluation of risks, this would be a complete waste of time for 
 most people IMHO.

 Sure - if you don't browse the Internet, share USB sticks, etc., you probably 
 don't need to do those things.

But I do browse the internet, and I do share USB sticks. Yet I don't do most of 
what you list above.

Everything is about /management/ of risk, not 99.99% avoidance of risk.

Just as people don’t live in impenetrable fortresses, and keep their money in 
Fort Knox, it's not actually necessary (or even desirable IMHO) to do some of 
things you do to have an acceptable level of risk. The marginal benefit from 
each additional step you are taking vs. the cost to usability and time taken 
isn't worth it (again, IMHO)

 I run as an admin on my personal machine. I don't bother reading all mail in 
 plain text, 
 and I don’t full disk encrypt all my machines, and I don't clear my cookies. 
 I've got better 
 things to do with my time, and if I focus on protecting my identity and data 
 instead, I'm 
 probably just as likely as you to be safe.

 So, care to share how you protect your identity and data without any 
 technologies or processes?

Let's be clear - I'm not saying I have no technology, and my strategy is to 
rely on magic. 

I start by worrying about what my family needs/wants to be able to do, and then 
what apps and data we need to do it, and then work out what the threats/risks 
are. You can draw a parallel to business - info - technology architecture 
from TOGAF or similar framework if you want. Malware and hackers getting into 
my home network is probably about half-way down the list at the moment. 
Additionally, instead of inconveniencing end users with restrictions on either 
user experience, I want technology to work in the background to protect us (if 
possible). So, we use 802.1x for our wireless since we're all on an AD domain, 
and SOHO APs all support it now (there's a guest wireless network for 
visitors), and I use centralised malware scanning on the Exchange server. I'm 
researching some options for outsourcing the malware/junk scanning for incoming 
(it's a pity that Postini doesn't seem to be available anymore)

But things I worry about more are hardware failure, lightning strikes (had two 
of those in two different homes), being burgled, having a fire or something 
else similar that destroys things. 

The information I worry about protecting isn't just what's electronic/digital, 
but also paper records, passports, birth certificates and so on.

So, it's starting from a different starting point. It's not starting from you 
should encrypt your disk, delete your cookies, run as a non-admin. It's 
starting from what types of critical/important/throw-away data do I have in 
order to live/work/interact with friends, and then what are the risks to that 
data, and what can I do about it. And weigh all that against usability

So, I'm not particularly worried about someone getting access to the password 
for the media centre PC's default user account. I'm more worried about that 
account somehow getting logged out, and whoever is using our media centre not 
being able to log back in again. I mitigate the risk of people knowing the 
password doing something bad by restricting what that account is allowed to do. 
Likewise I want to be able to share things with my family overseas, bank online 
and do various other things - at the same time without impacting my user 
experience significantly, so I take other measures to help reduce risk: I get 
notifications for purchases on my CCs over a certain amount. Most of my banks 
require (or at least offer) 2FA for authentication now. Etc.

Cheers
Ken

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: On the subject of security...

2013-04-17 Thread Kurt Buff
On Wed, Apr 17, 2013 at 7:08 PM, Ben Scott mailvor...@gmail.com wrote:
 On Wed, Apr 17, 2013 at 4:07 PM, Kurt Buff kurt.b...@gmail.com wrote:
 My point is that you have to use
 the same methods to protect unprivileged accounts as you do
 root/administrator.

   True and unremarkable.

   There, I did it, too.  See how that fails to contribute to the discussion?

In this case, because it's untrue, because your point below is wrongheaded...

 Not that they're equivalent in power, but that each kind of account
 can do and has access is different and equally valuable.

   For the typical home user, which is what that comic is focused
 on[1], not so much.

 Root/Administrator is valuable because it can subvert the protections
 on, or directly access, the data that end-user accounts have, and
 end-user accounts because that's the actual money/IP resides.

   And for a home PC *THERE IS ONLY ONE USER*.

 -- Ben

 [1] Note what's in the bubbles around the edges.

Yes, I noted the bubbles. But a), even for home users, while there
might be only one user, there should be *at least* n+1 users, where n
is the number of individuals who actually use the machine, plus an
administrator account, and b) given all of those bubbles, the end user
is in a threat-rich environment, so must exercise the vigilance
techniques I and others have described/prescribed, if they care about
their data, privacy and finances.

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin