Fire Alarms and physical security

2003-08-04 Thread John Brightwell
Dear All There is contention between security and access in the event of a fire. i.e if there _really_ is a fire then you want all the doors to be unlocked so that people are able to leave the premises safely (this is easy to achieve). You also want _all_ the rooms to be accessible from the outsi

RE: AW: Multi-User Access to Password Database

2003-07-17 Thread John Brightwell
Mmmm I must be phrasing my question badly... The majority of responses seem to suggest storing All the passwords in a file (or database) protected by a shared password. As I mentioned in my email this isn't suitable because 1. Anyone who requires access to the file/database for a specific purpose

Re: AW: Multi-User Access to Password Database

2003-07-14 Thread John Brightwell
o having > a human factor in the > equation rather than relying on machines. > > badenIT GmbH > System Support > > Chris Meidinger > Tullastrasse 70 > 79108 Freiburg > > __ > > Es gibt 10 arten von Menschen auf dem Planeten, > welche d

Multi-User Access to Password Database

2003-07-10 Thread John Brightwell
Dear All Looking through the archive of secuity newsgroups and mailing lists it looks as though there have been a few threads related to personal storage of passwords. Typically this results in a file or index of passwords encrypted and protected by a single password. I need to store a number of

RE: Question for you all

2003-07-03 Thread John Brightwell
> -Original Message- > From: CreativeSell [mailto:[EMAIL PROTECTED] > Sent: 30 June 2003 22:50 > To: [EMAIL PROTECTED] > Subject: Question for you all > > Hi Olly, Probably the first thing I'd do is get hold of a private email address that isn't easily associated with your site and use t

Security Awareness Training

2003-07-02 Thread John Brightwell
This is going to be one of those "Mmmm is he a would-be bad guy" type emails... I want to get hold of precompiled/scripted exploits that I can demonstrate in a security awareness course. I'd set up a victim client, a victim server and an attacker system. With this I can demonstrate how browsers

RE: IDS question [was: Re: Firewall and DMZ topology]

2003-06-16 Thread John Brightwell
> I wasn't completely clear in my last e-mail. I was thinking more > along the lines of having the IDS in the DMZ. Any attacks that get > past the outside firewall to the DMZ hosts would be caught by the > IDS in the DMZ. The attacks that don't make it past the external > firewall into the D

RE: Firewall and DMZ topology

2003-06-12 Thread John Brightwell
I agree that in many cases a tri-homed system is 'adequately secure' however, I think that a dual firewall implemetation can provide a greater measure of security. They may be more prone to failure than a single firewall - in that the same rule has to be applied to two different firewalls (and dif

RE: Home users with VPN connections

2003-03-25 Thread John Brightwell
Not being a windows guru ... is it possible to take a copy of the home user's PC config and use that to derive a new 'corporate' boot disk. I can see a world of pain in users having to bring in their PC but bringing in a backup (or even the current boot disk) may be possible. With the info d

RE: Vendor wants remote control of our Servers and Workstations

2003-03-10 Thread John Brightwell
Of course the age-old problem with security is that the access restriction can impact on usability or support. If you go ahead with the proposed solution then the Vendor has significant access to your internal network. How much do you trust the vendor? Are they liable for any damage they cause whi

"It's ok we're behind a firewall"

2003-02-20 Thread John Brightwell
"It's ok we're behind a firewall" The response I received from a DBA when I forwarded an email detailing a security vulnerability in a particular database application. And not the first time I have heard this response when cautioning about security vulnerabilities. I want to raise the security a

Security Stance for Internal Systems ... comments?

2003-02-18 Thread John Brightwell
Dear All I'm sure many people are familiar with how to harden the OS by reducing the number of packages installed and limiting the available services - there is obviously a tradeoff with usability (as ever with security) as well as cost of administration. For exposed machines (DNS, webserver, mail