NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [FW1] intrusion detection - benifits?



	I find that keeping a healthy level of paranoia is often a security
admin's best defense.  No you cannot trust your employee's, as Scott said
below, because numbers don't lie.  If you could trust your employees then
there wouldn't be a need to devise an internal security policy, which there
obviously is.

Thanks,
Abe

Abe L. Getchell - Security Engineer
Division of System Support Services
Kentucky Department of Education
VoiceE-mail  [email protected]
Web     http://www.kde.state.ky.us/



> -----Original Message-----
> From: Rogue Bolo [mailto:[email protected]]
> Sent: Wednesday, November 29, 2000 9:14 AM
> To: Scott Schindler; fw-1-mailinglist@lists. us. checkpoint. com
> (E-mail)
> Subject: Re: [FW1] intrusion detection - benifits?
> 
> 
> 
> Which makes more sense....keeping a gun trained on
> your wife and children, or on the thugs walking up and
> down your street looking for trouble? Yes it is an
> extreme example but it makes a point.
> 
> --- Scott Schindler <[email protected]> wrote:
> > 
> > Would a security professional please tell me where
> > most attacks and costs
> > related to security are initiated?  Would that be
> > from outside or inside?
> > (This is all rhetorical by the way)
> > 
> > Trust employees?  Intentionally or unintentionally,
> > numbers don't lie.
> > Welcome to security.  Trust no one.  But I could be
> > lying, wouldn't that be
> > ironic.
> > 
> > ----- Original Message -----
> > From: "Andrew Bagrin" <[email protected]>
> > To: "Pellowski, Tom" <[email protected]>;
> > "fw-1-mailinglist@lists. us.
> > checkpoint. com (E-mail)"
> > <[email protected]>
> > Sent: Tuesday, November 28, 2000 4:06 PM
> > Subject: Re: [FW1] intrusion detection - benifits?
> > 
> > 
> > >
> > > If you don't trust users on your internal network.
> > > Andrew Bagrin
> > > Secure-1
> > >> > > www.secure-1.com
> > > ----- Original Message -----
> > > From: Pellowski, Tom <[email protected]>
> > > To: fw-1-mailinglist@lists. us. checkpoint. com
> > (E-mail)
> > > <[email protected]>
> > > Sent: Tuesday, November 28, 2000 8:45 AM
> > > Subject: [FW1] intrusion detection - benifits?
> > >
> > >
> > > >
> > > > Greetings:
> > > >
> > > > I have this question that I would like the
> > community to give me their
> > > .02
> > > > worth.
> > > >
> > > > In an arena running Checkpoint (whatever flavor)
> > is it really worth
> > > the
> > > > time, expense, and possible network performance
> > compromises to put a
> > > > separate intrusion detection appliance online in
> > front of the
> > > firewall?
> > > >
> > > > I understand that there are tons of "well, you
> > could.." but what I am
> > > really
> > > > after is "your" opinion. Would you, as the FW
> > admin/engineer, do it.
> > > >
> > > > Obivously I am looking for some backup here as I
> > am having a intrusion
> > > > detection package rammed down my throat, and
> > frankly, I don't want it.
> > > But
> > > > my only defense at this point is that "is
> > something more to manage".
> > > >
> > > > Thanks to all in advance!!!
> > > >
> > > > Tom
> > > >
> > > >
> > > >
> > > >
> > > >
> > >
> >
> ==============================================================
> ==========
> > > ====
> > > ====
> > > >      To unsubscribe from this mailing list,
> > please see the
> > > instructions at
> > > >               
> > http://www.checkpoint.com/services/mailing.html
> > > >
> > >
> >
> ==============================================================
> ==========
> > > ====
> > > ====
> > >
> > >
> > >
> > >
> >
> ==============================================================
> ==========
> > > ========
> > >      To unsubscribe from this mailing list, please
> > see the instructions
> > > at
> > >               
> > http://www.checkpoint.com/services/mailing.html
> > >
> >
> ==============================================================
> ==========
> > > ========
> > 
> > 
> >
> ==============================================================
> ==================
> >      To unsubscribe from this mailing list, please
> > see the instructions at
> >               
> > http://www.checkpoint.com/services/mailing.html
> >
> ==============================================================
> ==================
> 
> 
> __________________________________________________
> Do You Yahoo!?
> Yahoo! Shopping - Thousands of Stores. Millions of Products.
> http://shopping.yahoo.com/
> 
> 
> ==============================================================
> ==================
>      To unsubscribe from this mailing list, please see the 
> instructions at
>                http://www.checkpoint.com/services/mailing.html
> ==============================================================
> ==================
> 


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents © 2004 Network Presence, LLC. All rights reserved.