gfortaine at live.com
Tue Mar 23 05:13:48 CDT 2010
>> Conclusion : if you can't reply to these fundamental questions, hire a
>> CISO and build a CSIRT.
> <sigh> I *so* hate making an argument from authority (other than "I think smb
> published a paper on that already"), but in your case I'll make an exception.
> Go read http://www.sans.org/dosstep/roadmap.php
> Read the date, read the signatories.
I have read with interest this document.
1) Remarks :
-Bill Clinton is no longer the president of USA . Howard Schmidt is the
new cybersecurity czar :
(By the way, Gadi Evron is in his Facebook friends ?!?)
2) Notes :
a) Problem 1: Spoofing & Problem 2: Broadcast Amplification
b) Problem 3: Lack of Appropriate Response To Attacks
c) Problem 4: Unprotected Computers
> Ask yourself if you *really* want to be
> telling me that we need to build a CSIRT. (Answer - our CIRT was up and
> running back in 1991, and was well-known in 2000. So no, we don't need advice
> on how to start one.
o Students designed, built, and are maintaining the vulnerability scan
engines that are
the core of the www.ids.cirt.vt.edu site.
3 Journal papers, including IEEE Intelligent Systems
20+ conference papers (RAID, AAMAS, IAT, FloCon,...)
How to get it?
-INVEA-TECH a.s. - FlowMon probes, collectors for high-speed data
monitoring (with MU, VUT and CESNET)
-Cognitive Security s.r.o. - CAMNEP system for real-time data mining
U.S. ARMY RDECOM-CERDEC, CESNET, Czech MOD
> We've got literally man-centuries of experience in running
> one already. By the way, where were you in 1991?)
In 1991, I was in primary school. In 2000, the date of your link, I got
my first access to Internet. And now ? ;) !
More information about the NANOG