Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Ironkey also supports Linux! (Score 4, Informative) 191

I'm using an Ironkey at work (have been for about 2 years now) and the thing has been rock solid. However, the main reason I selected it is that it's the only key that I've had the opportunity to trial which is both FIPS 140-2l2 compliant *AND* supports Linux.

I use it with WinXP and MacOSX daily and yes, they do ship with "alpha" Linux drivers. Not full support like Win* but enough to read and write the encrypted data, which is all I really use.

Although the company claims that you can now "initialize" a key on MacOS, all the versions I've used required an initial bootstrapping under Windows before being cross-platform usable.

Comment Re:The really real problem: no use of the thumbs (Score 1) 586

Hi there! I've been using a Kinesis Advantage keyboard for years now for exactly the first reason you listed (very little use of thumbs). On the Advantage, your thumbs operate: Backspace, Delete, Space, Enter, Ctrl, Alt, PgUp and PgDn. It's fantastic, helped me speed up my typing speed and also cut the annoying wrist pain. (Note: I don't work for them, own stock in them or anything. I just really like the keyboard).

Comment Re:Easy 2 part solution (Score 1) 303

That's a remarkably simple solution!

I'm interested but please elaborate a bit.

1) Define "even vaguely sensitive" data. At which point does information universally become sensitive?
1a) Of particular interest, at which point does NONsensitive information that is meant to be public become, in aggregate, sensitive?
2) Define how the access is to be secured. By protocol would be helpful.
3) Explain how the network of random proxies would be set up so as to obfuscate their government nature while thousands of government employees do their jobs via those links
4) Define how government scientists and engineers, robotics specialists, munitions developers, etc would get their jobs done with no root access to their systems.
5) Describe the code assurance program by which you would ensure that all code running on those systems had no backdoors

Once you've got those details sufficiently mapped out, you can put together a white paper and begin proposing it to the NSA.

Comment Re:Lazy (Score 1) 678

I don't have mod points to mod you (-1, rant) so I'll just ask: Are you actually a parent and do you understand a parents' responsibility to their child?

The OP seems to be doing a lot of things right to me. They're not asking for people to parent for them, they're asking other geeks (who may also be parents) for advice on how to protect the kid when they need to be protected -- so they can cut the kid loose when they're ready for that.

"delegating your responsibilities to everyone besides yourself" would be saying "help, help, we need to ban porn on the internet because I have a kid".

Anyway, get some Xanax or something and bring it down a notch.

Comment OTRS (Score 2, Interesting) 321

I've had fantastic results using OTRS to support both research scientists in a professional organization (8 sysadmins, 350+ scientists), a web-based document repository with a few thousand users (And 2 support staff) and a volunteer parrot rescue with about 50 staff, hundreds of volunteers/adopters and 2 support techies.

It's free, open source (LAMP) and having hacked at the source code I can say that it's VERY Solid and well-written Perl. With mod_perl2 even an older Linux box could handle the load.

Comment Re:You don't need to. (Score 1) 468

jotaeleemeese: You're correct that laptops (for large businesses and government) should be no more than thin clients nowadays in many cases - but the article is about "when you have to encrypt absolutely everything". The poster indicated ALL devices getting encryption, which would include desktops, USB keys, CD-ROM media, email and even servers if you took things that far!

Keep in mind, requirements are king. If you have no sensitive data but require a lot of computing power on a workstation, encryption there doesn't make sense. You rob yourself of computing power for no security gain. That kind of balancing act is the core of what makes a good IT Security person.

Comment Re:"I don't know where my sensitive data is!" (Score 1) 468

Which is a pretty good idea. Page files, application-level caches, all this stuff muddles the water of where our sensitive data might be. And trusting employees to keep everything where it should be is just stupid. Even if they're smart guys, people make mistakes.

I agree with you and full disk encryption CAN be a solution to the problems that confront some organizations. However the fact that it can be a solution doesn't mean that it is applicable universally, or is even the most appropriate solution. For example, would you mandate full disk encryption for the disks residing on a server? Why bother, if the server is in a secured area and is never "at rest".

In any case, the shotgun approach is never the appropriate solution to not putting appropriate thought into the process which is what I most object to.

it doesn't make sense to go from there to, "encrypting everything doesn't make sense because it doesn't make you definitely safe." That argument leads to the inevitable conclusion that any security feature is unnecessary because, as you've said, nothing fits the bill.

I would never suggest that, because as you've pointed out it's a slippery slope type fallacy. What I wil say to clarify is that it is not an appropriate replacement for the risk analysis process, as it is often used.

Not really. Being able to access the data, and being able to carry the data out are two entirely different things. If your data is really important, and the computer holding the data isn't connected to the 'net, the insider doesn't have admin rights, and the usb ports are disabled to people without admin access...he could still break in and steal the hard drive. There's a reason to keep it encrypted.

Well, when I say "if you have the key" I really mean, having the encryption key. Malicious insiders generally carry out data they've been given access to. Certainly espionage-wise, rival companies or governments are likely to target someone who already has access to the data they want, and get that person to be the leak. If a malicious insider is your threat, disk-at-rest encryption is not going to do much to mitigate that.

Yes, that's the type of question that he most definitely needs to deal with. But again, as long as they are looking into issues of that sort, and not just buying into what they think is instant security, there's absolutely no downside to encrypting everything.

I wouldn't go so far as to say there's absolutely no downside to encrypting everything. All encryption has overhead - some products, significant overhead. Then there's either the extra expense of a key management strategy and team plus sysadmin overhead and labor OR the cost of losing data once something bad occurs and the data cannot be recovered.

If his company does an accurate study into their risks and adopts mitigations for them, it might be the case that they only have a relatively minor pool of sensitive information that can be managed server-side through use of things like VMWare ACE, or Citrix, or ... insert appropriate technology here. If they're most worried about laptop/usb key loss then they can adopt things like safeboot or buy Ironkeys/Cruzers/etc.

My main point is that encrypting everything has downsides and he needs to be sure they're worth the gain - the only way that can be done is through risk analysis.

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...