wrt "Network Endpoint Assessment"
Victor Duchovni
Victor.Duchovni at MorganStanley.com
Thu Jun 21 13:09:12 EDT 2007
On Thu, Jun 21, 2007 at 04:32:50PM +0300, Alexander Klimov wrote:
> Hi.
>
> On Wed, 20 Jun 2007 Jeff.Hodges at KingsMountain.com wrote:
> > Network Endpoint Assessment (NEA): Overview and Requirements
> > <http://www.ietf.org/internet-drafts/draft-ietf-nea-requirements-02.txt>
> > [...]
> > NEA technology may be used for several purposes. One use is to
> > facilitate endpoint compliance checking against an
> > organization's security policy when an endpoint connects to the
> > network. Organizations often require endpoints to run an IT-
> > specified OS configuration and have certain security
> > applications enabled, e.g. anti-virus software, host intrusion
> > detection/prevention systems, personal firewalls, and patch
> > management software. An endpoint that is not compliant with IT
> > policy may be vulnerable to a number of known threats that might
> > exist on the network.
>
> I wonder what stops a trojan to disable an antivirus, but screw
> the reporting system up so that it pretends that the antivirus
> is still active?
Nothing, the technology is not sufficient, merely necessary...
--
/"\ ASCII RIBBON NOTICE: If received in error,
\ / CAMPAIGN Victor Duchovni please destroy and notify
X AGAINST IT Security, sender. Sender does not waive
/ \ HTML MAIL Morgan Stanley confidentiality or privilege,
and use is prohibited.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list