> -----Original Message-----
From: Howard C. Berkowitz [mailto:hcb@gettcomm.com]
Sent: Tuesday, November 09, 2004 9:03 PM
To: opsec@ops.ietf.org
Subject: Re: survey of isp security practices
Here are a couple of stabs at reorganization. This isn't a complete
re-do but just an idea to show my thinking.
While I'm really, really not trying to do a comprehensive model, I do
think it's worth keeping three things in mind:
1. Risk[1]/Threat: An impact on the SP if the exploit
takes place.
It is assessed with respect to a revenue source or
UhOh! Unless things have changed since i've been away from the IETF
(lurking, but haven't been to the meetings in a couple of years :)
putting a '$' in front of anything that isn't a variable name is
a no-no.
I agree with the concept though, but I would recommend we strictly
identify the threat in terms of service lost or systems compromised
(or any other non-denominational methods). Justifying the cost
of said impact is an exercise for the deploying organization.
cost seen by
upper management, such as bandwidth, network element
(e.g., router)
availability, and host denial of service. By [1], I
mean the expected
financial cost multiplied by the probability of the event.
I recognize that host denial of service is right at
the edge of the
charter, but I think we need to include things that
prevent the host
being used through the ISP network, such as a SYN-Flood.
2. Exploit: a class of technical attack
James A Benedict
Software Developer
Tel: 613-723-5076 x3303
Cell: 613-797-1593
jbenedict@ca.safenet-inc.com
www.safenet-inc.com
The information contained in this electronic mail transmission may be
privileged and confidential, and therefore, protected from disclosure. If
you have received this communication in error, please notify us immediately
by replying to this message and deleting it from your computer without
copying or disclosing it.