Delmore Schwartz, American poet
circa 1950's
Often misattributed to Henry Kissinger
or to being an "old saying"
Winston Churchill
Douglas Gerdin, System Administrator, AI Center, SRI International
Douglas Moran
"But anytime you have the ability to automate something, there's always the potential for misuse," he said. "More important than the technical side of this is the human side. It's not something technology is ever going to be able to solve." ... Microsoft's Culp said Internet users must ultimately understand technology's limitations. He said customers have the option to turn off some of the features in question and take other security precautions.
"We as a society chose to get more connected, and one of the perils of doing that is, the more connected you are with everybody, the more connected you are with malicious people as well."
Scott Culp, a security manager at Microsoft, quoted in "Technology Security Risks Growing" by Anick Jesdanun, AP, 5/5/2000
Edward Amoroso,
Intrusion Detection: An Introduction to Internet Surveillance,
Correlation, Trace Back, Traps, and Response,
Intrusion.Net Books, New Jersey, 1999, ISBN 0-9666700-7-8.
page 52
Decoy servers are of value to security managers who are collecting threat information on intruders or who are collecting evidence to support taking legal action against them. Using a decoy server allows the victim of an intrusion to determine the intent of the intruder, logging extensive information about the activities of the intruder without placing the actual system contents at risk of damage or divulgence. This information can also be used to construct custom detection signatures.
Information collected in this way is also of value to those performing trend analysis of network security threats. This information is of particular interest in systems that must operate in hostile threat environments or that are subject to large numbers of attacks (such as government Web servers or high-profile electronic commerce sites).
Rebecca Gurley Bace, Intrusion Detection,
Macmillan Technical Publishing, Indianapolis, 2000, ISBN 1-57870-185-6.
page 128, section 5.2.1.3: Collect Additional Information
* Ross Anderson and Roger Needham. "Programming Satan's Computer", Computer Science Today, Springer LNCS, v1000: 426-441
Rebecca Gurley Bace, Intrusion Detection,
Macmillan Technical Publishing, Indianapolis, 2000, ISBN 1-57870-185-6.
page 192
First, look for signs that the vendor understands the need for hardening the intrusion detection system against attack. ...
Second, look for signs that the vendor understands the need for hardening the intrusion detection application itself. Look for signs of extensive quality assurance testing. Look for evidence of secure programming practices. Look for vendor assurances of appropriate security measures taken in the design and development of the systems (Does the firm do background checks on its developers to minimize the possibility of subverted software in the product?). Also, look for signs of security-savvy design. Examples include the following:
Rebecca Gurley Bace, Intrusion Detection,
Macmillan Technical Publishing, Indianapolis, 2000, ISBN 1-57870-185-6.
pages 221-222, 10.2.3: How Did You Test This?