[clug] Security for home - Topic for discussion
George at Clug
Clug at goproject.info
Mon Feb 25 01:21:25 UTC 2019
Bob,
I liked your comments, they are an important starting point:
How about:
- what are you trying to protect (reputation, cpu cycles, privacy,
...)
- how much is it worth to someone else
- how much are you willing to expend to protect it
To "what are you trying to protect", I would add "repurposing of your
account or computer system for illegal means, theft of your identity,
theft of your finances, theft of your privileged access to systems"
I read once that hackers can gain access to a person's account of a
system which is of no obvious value, to gain access to the system in
order to gain access to other accounts of to other systems, going
along a chain, with the ultimate goal of gaining an account that has
access to a major system. A reason to use separate passwords for each
account that you have.
A few links to help people with insomnia...
https://en.wikibooks.org/wiki/Fundamentals_of_Information_Systems_Security/Access_Control_Systems
https://acsc.gov.au/publications/protect/Secure_Administration.pdf
http://www.infosecisland.com/blogview/25102-The-Importance-and-Requirements-of-Privileged-Access-Management.html
https://en.wikipedia.org/wiki/Security_hacker
George.
On Monday, 25-02-2019 at 11:36 Bob Edwards via linux wrote:
On 25/2/19 10:51 am, Brenton Ross via linux wrote:
> On Mon, 2019-02-25 at 10:01 +1100, Kim Holburn via linux wrote:
>>
>> On 2019/Feb/24, at 8:53 pm, Bryan Kilgallin via linux
* wrote:
>>
>> Thanks, Kim:
>>
>> I have an on-going project to make home networks more secure.
>>
>> How can one measure a baseline?
>>
>> Impossible question. How do you?
>>
> If it was my problem I would proceed thus:
>
> You start with a list of all known attacks.
> You rate each one according to how difficult it is to implement.
> You score a network according to how many it resists.
>
>
"all known attacks" => known to you (the author(s) of the list).
all attacks known to others, now or in the future.
How about:
- what are you trying to protect (reputation, cpu cycles, privacy ...)
- how much is it worth to someone else
- how much are you willing to expend to protect it
More airy-fairy, but allows you to have a life.
cheers,
Bob Edwards
--
linux mailing list
linux at lists.samba.org
https://lists.samba.org/mailman/listinfo/linux
More information about the linux
mailing list