> -----Original Message-----From: Howard C. Berkowitz [mailto:hcb@gettcomm.com] Sent: Tuesday, November 09, 2004 9:03 PM To: opsec@ops.ietf.org Subject: Re: survey of isp security practices
Here are a couple of stabs at reorganization. This isn't a complete re-do but just an idea to show my thinking.
While I'm really, really not trying to do a comprehensive model, I do think it's worth keeping three things in mind:
1. Risk[1]/Threat: An impact on the SP if the exploit takes place. It is assessed with respect to a revenue source or
UhOh! Unless things have changed since i've been away from the IETF (lurking, but haven't been to the meetings in a couple of years :) putting a '$' in front of anything that isn't a variable name is a no-no.
I agree with the concept though, but I would recommend we strictly identify the threat in terms of service lost or systems compromised (or any other non-denominational methods). Justifying the cost of said impact is an exercise for the deploying organization.
cost seen by upper management, such as bandwidth, network element (e.g., router) availability, and host denial of service. By [1], I mean the expected financial cost multiplied by the probability of the event.
I recognize that host denial of service is right at the edge of the charter, but I think we need to include things that prevent the host being used through the ISP network, such as a SYN-Flood.
2. Exploit: a class of technical attack
James A Benedict Software Developer
Tel: 613-723-5076 x3303 Cell: 613-797-1593 jbenedict@ca.safenet-inc.com www.safenet-inc.com
The information contained in this electronic mail transmission may be privileged and confidential, and therefore, protected from disclosure. If you have received this communication in error, please notify us immediately by replying to this message and deleting it from your computer without copying or disclosing it.