wrt "Network Endpoint Assessment"

Victor Duchovni Victor.Duchovni at MorganStanley.com
Thu Jun 21 13:09:12 EDT 2007

On Thu, Jun 21, 2007 at 04:32:50PM +0300, Alexander Klimov wrote:

> Hi.
> On Wed, 20 Jun 2007 Jeff.Hodges at KingsMountain.com wrote:
> > Network Endpoint Assessment (NEA): Overview and Requirements
> > <http://www.ietf.org/internet-drafts/draft-ietf-nea-requirements-02.txt>
> > [...]
> >     NEA technology may be used for several purposes.  One use is to
> >     facilitate endpoint compliance checking against an
> >     organization's security policy when an endpoint connects to the
> >     network.  Organizations often require endpoints to run an IT-
> >     specified OS configuration and have certain security
> >     applications enabled, e.g. anti-virus software, host intrusion
> >     detection/prevention systems, personal firewalls, and patch
> >     management software.  An endpoint that is not compliant with IT
> >     policy may be vulnerable to a number of known threats that might
> >     exist on the network.
> I wonder what stops a trojan to disable an antivirus, but screw
> the reporting system up so that it pretends that the antivirus
> is still active?

Nothing, the technology is not sufficient, merely necessary...


 /"\ ASCII RIBBON                  NOTICE: If received in error,
 \ / CAMPAIGN     Victor Duchovni  please destroy and notify
  X AGAINST       IT Security,     sender. Sender does not waive
 / \ HTML MAIL    Morgan Stanley   confidentiality or privilege,
                                   and use is prohibited.

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com

More information about the cryptography mailing list