Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
CyberPingu
Sep 15, 2013


If you're not striving to improve, you'll end up going backwards.

Shrecknet posted:

I mean in the sense that it satisfies none of the four levels of mens rea required to establish a crime has occurred.

If Colonel Sanders ran down the street yelling what the seven herbs and spices are, and I write down what he is yelling, that is not a corporate espionage invasion into KFC HQ.

If a person could access a piece of data without bypassing any encryption or indeed even a No Trespassing sign, that cannot be considered hacking.

The public has no duty to avert its eyes, in other words

And this is why the term hacking has been so muddied and lost all meaning anymore (which I understand is the point of this thread).

Unauthorised access doesn't always mean hacking.

If you were to steal someone's front door key, and use that to get into their house. That's not hacking, it's Unauthorised access

Kicking the door in or picking the lock is hacking in a sense as it's exploiting an unintended aspect of the security measure.




I guess beyond that is something that's been mentioned earlier but as someone who works in Cyber Security, it's loving difficult and I don't think people realise how difficult it is.

Companies generally don't give a poo poo unless something happens to them, and even then the people that take the blame are the head of security or the guys patching the systems. Which in reality it's rarely their fault. Most security and IT teams are understaffed and under budgeted. They aren't allowed to implement patches when they want as that would incur downtime for the systems which would mean loss of potential revenue. They are then asked to work overtime or be on call when something goes wrong.

I also feel we as a security community don't do enough of the basics correctly and rely on automated systems and tools too much. Education is severely lacking for most companies beyond "Here's a 5 min video on phishing. Now remember don't click on poo poo".

Adbot
ADBOT LOVES YOU

CyberPingu
Sep 15, 2013


If you're not striving to improve, you'll end up going backwards.

Aramis posted:

Also very telling is the fact that while insurance companies care to some degree that you have some security in place, what they REALLY care about is that a company has a recovery plan in place. The expectation is that it's basically impossible to protect a system against a motivated attacker without incurring hilariously excessive costs that very few companies are willing to actually fork out.

Cyber insurance is a loving scam.

It is basically impossible to cover all your bases and even then unless you are rolling everything in house (don't roll your own cryptography) you are at the mercy of 3rd parties keeping their poo poo up to date too.

CyberPingu
Sep 15, 2013


If you're not striving to improve, you'll end up going backwards.

CommieGIR posted:

Cyberinsurance is a scam, largely because most cyberinsurance plans have stuff in fine print that actually requires to do some basic infosec stuff otherwise they won't pay out.

Also: Most companies Disaster Recovery plans are never tested, if they exist at all. Part of why it was laughable when Pompeo was discussing outlawing paying raonsomware, as it would likely impact American business interests more than it would harm ransomware groups

Source: I do Infosec consulting for Incident Response and Security Engineering

Even with basic infosec stuff they sometimes don't pay out. Some companies won't pay out if info was stolen or downtime occured via a phishing attack.

Also most companies do not have a good incident response plan either. The previous place I worked was basically "Well we will phone the on call IT guy and see if he answers or not"

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply