Re: Patterns and Security Measurement

From: Dan Catalin Vasile (hardware_cta@yahoo.com)
Date: Mon May 08 2006 - 02:03:36 EDT


Hi,
There is no 'one way' to measure security because you
don't have a ruler accepted by everybody for that.
Instead, there are several aproaches...
One would be to perform an audit. Here you can choose
between ISO 17799 (more 'commercial' version) and all
the other standards that put together generated ISO
17799, or you can choose OSSTMM. Open source... you
know, more likeit. There are consistent differences
between the tow. ISO is theoretical while OSSTMM is
more practical. But you can do some googleing to
figure out what is best for you.
Another approach would be... surprise! a pen test. :)
But it seems the problem is a little bit complex for
this.
You can also try a risk management and vulnerability
assessment approach.

Remember that the best security solution money can buy
is worthless if it's not used correctly. The idea is
to develop the best security with the resources you
have.

Greets,
Dan

--- Nguyen Pham <nguyen.petronius@gmail.com> wrote:

> Hi list,
>
> Actually, I am trying to measure security (and then
> security assurance)
> level of a complex telecommunication network. I am
> looking for a
> method/approach/product using sets of predefined,
> standard entities
> (station, server, firewall, router, ...) and
> relations (forming
> "patterns" like pipe, cluster, bus, gateway, ...,
> architectures) which
> have already been measured to simplify the process
> of system security
> measurement. An aggregation algorithm is then needed
> to arrive at an
> overall system security value.
>
> Any recommendation of academic or industrial
> solutions would be welcome.
>
> Other suggestions for solving the problem (security
> measurement of
> complex network) are also greatly appreciated.
>
> Many thanks,
> Nguyen Pham.
>
>
------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only
> one to win the Analyst's
> Choice Award from eWeek. As attacks through web
> applications continue to rise,
> you need to proactively protect your applications
> from hackers. Cenzic has the
> most comprehensive solutions to meet your
> application security penetration
> testing and vulnerability management needs. You have
> an option to go with a
> managed service (Cenzic ClickToSecure) or an
> enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how
> a managed service can
> help you:
> http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit
> for you to confirm your
> results from other product. Contact us at
> request@cenzic.com for details.
>
------------------------------------------------------------------------------
>
>

__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:54 EDT