Search Results for: OT risk analysis

Danged if you disclose; danged if you don’t.

In this article at The Register, a point is raised; is it even worth disclosing vulnerabilities, considering the ramifications?

In the cryptographic community, disclosure is mortar; it is responsible for the stability of research in the field. Good, secure cryptographic design is a product of the cryptanalytical aptitude that was built before it. Simply put, this means that cryptography, in general, has been successful, due to the fact that cryptanalysts are able to publish results. These results may include practical attacks on applied cryptographic systems, which leads me to wonder – could a cryptanalyst face legal woes in the event of disclosing a cryptographic weakness with the context of this issue at hand? Probably; it's contextual.

Over the decades, the reason we've built progressively better cryptography is because of cryptanalytical results published by fellow cryptographers; younger, maturing cryptographers, such as myself, look to these past results as our foundation. Recognizing and disclosing insecurity is essential for the rethinking and designing of security.

There are nooks and crannies to the disclosure debate that have been investigated over the years, but when all is said and done, disclosure, in general, is a necessity. Errors resulting in insecurity are inevitable, but they cannot be shrugged off as a matter of course, then pushed to the side. Correctness and security are both crucial.

As humans, we have an unspoken duty of defending our basic human rights. If there was a bill of security rights, disclosure would be on there, without a doubt; it wou

Tom Shinder’s Trek through Small Business Server 2003 Service Pack 1 – Part 2: The CEICW from the Welcome Page to the Router Connection Page

In this article I’ll begin my trek through the installation and configuration of SBS 2003 SP1. The installation is a clean installation. I will not discuss upgrade scenarios in this series. While I realize that this isn’t the most common deployment scenario, it allows me to discuss the salient points of the CEICW and subsequent ISA firewall installation and configuration.

Security Series: Building Preparation (Part 5 of 6)

In part five we take the IT professional through strategies of offsite recovery and potential solutions that could be recommended to businesses for recovery. The importance of pre-disaster preparation is highlighted and the fact that just basic preparedness is done in the event of disaster proves to be worth the time and cost invested.

Deploy Windows Server 2003: Considerations for Planning Network Bandwidth

Site links are a critical part of building Networked Windows Networks – How do Domain Controllers speak to each other without having synchronization problems? Network bandwidth being over utilized can play havoc with your network, at the same time affecting your Windows Server 2003 systems by creating errors in your logs seen in the Directory Services Log in the Event Viewer on our Domain Controller (DC). In this article we discuss things to consider when planning and designing site links.

Scroll to Top