home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!wupost!cs.utexas.edu!natinst.com!news.dell.com!math.utexas.edu!ut-emx!ccwf.cc.utexas.edu
- From: ifbb657@ccwf.cc.utexas.edu (Douglas Floyd)
- Newsgroups: comp.security.misc
- Subject: Re: Two hackers caught tapping into Boeing, federal computers
- Message-ID: <84008@ut-emx.uucp>
- Date: 19 Nov 92 23:40:26 GMT
- References: <1992Nov12.084549.5128@unix.brighton.ac.uk> <1992Nov12.142251.9131@hubcap.clemson.edu> <16987@umd5.umd.edu>
- Sender: news@ut-emx.uucp
- Organization: The University of Texas at Austin, Austin TX
- Lines: 52
-
- In article <16987@umd5.umd.edu> matthews@oberon.umd.edu (Mike Matthews) writes:
- >In article <1992Nov12.142251.9131@hubcap.clemson.edu> stehman%citron.cs.clemson.edu@hubcap.clemson.edu writes:
- >>Would you like to require people to read c.s.m for a couple of months before
- >>they're allowed to purchase a computer?
- >
- >There is a *BIG* *DIFFERENCE* between buying a computer and running a Unix
- >system, especially one that's got classified information on it (at least,
- >stuff that the public should NOT see). Imagine a convicted killer going free
- >because his file's been tampered with.
- >
- >And IF someone is running those systems, they had damn well BETTER know how
- >to make the systems secure. There should be *NO* passwords that are easily
- >guessable (ideally), but *DEFINITELY* not the root one.
- >
- >>Jeff Stehman Systems Staff, G-18A Jordan
- >>stehman@cs.clemson.edu Dept. of Computer Science
- >>(803)656-2639 Clemson University
- >------
- >Mike Matthews, matthews@oberon.umd.edu (NeXTmail accepted)
- >------
- >Whenever you find that you are on the side of the majority, it is time
- >to reform.
- > -- Mark Twain
-
- A little note: Because of the foibles in UNIX security, you would be a
- *FOOL* to connect up a computer with your business's vital records or
- trade secrets to the internet directly. The best way to protect
- sensitive data is to have the computer not connected to any network,
- or to hide it behind at least two firewalls, one specially created to
- block all incoming stuff, except for mail and news. (Even that is
- not secure... Remember the debug mode in SendMail a couple of years
- back... The worms crawled in, the worms crawled out :-)
-
- I am not a security expert, but if you are so horribly worried about
- some data, keep it on a seperate computer safely locked up with Medeco
- locks on the door, and good metal doors. Internet connections can be
- given to another computer for receiving mail, etc.
-
- Here is another item: If the data is vital, back it up, and store
- the data and the backups on removable media. Then, when you leave,
- store the original in a safe that is bolted down, and store the backups
- in a secure area, like a safety deposit box at your local bank. This
- method will secure from basically everything but scavenging for
- palempsits (spelling?), or putting the operator under duress.
-
- Any other ideas?
-
- --
- ********** ifbb657@ccwf.cc.utexas.edu (Douglas Floyd) **********
- Windows NT: * Disclaimer: I speak for myself *
- ***********************************
- You WANT your hard drive trashed now.
-