Tip

The Kingdom of Impervious: Episode I -- Protecting the infrastructure

Take a lighter look at the security world and enjoy the adventures of noblepersons (security gurus) defending their kingdoms (company networks) from evildoers (crackers). This ongoing column offers a whimsical view of what the dynamics of information security might have looked like in medieval times.

Once upon a time in a land far, far away, network and system noblepersons rejoiced in their deeds and frolicked in the mesmerizing and limitless horizon of connectivity.

Then, the worm turned. There were Slammers and Blasters and evildoers. "Oh my! Oh Mydoom!" Even so, many remained in denial (of service) and continued to marvel at the horizon.

It was a magical land where data floated from access points to users' Palms. Where sniffers played and users never

    Requires Free Membership to View

WEP'd. There was a Phish Fry once a week. The beer and the buffers overflowed. You could find Smurfs and Trinoos and kids playing Man in the Middle.

One day a faint but steady rumbling sound could be heard in the distance. It drew closer and louder and seemed to come from all directions. Its crescendo shook the infrastructure of the kingdom of Impervious. Holes began developing and the noblepersons began patching here and logging there. The rumble would subside and then, from the distance, it would begin again.

Firewalls were thrown up to ward off the sound. But the sound took off its shoes.

And the noblepersons cried out: "We must use advanced techniques to detect and prevent." "Damn the torpedoes." "We will perform patch management." "We have only just begun to fight." "Stop the worm in its tracks." "Does anybody really know what time(-to-live) it is?" "How are we going to pay for this?" "We better ask the King!"

"But he is the King of Impervious, and he will scoff at the notion of paying good coin to remain impervious. He will consider it extortion, blackmail, a king's ransom! He will not be happy. He will accuse us of not doing our jobs. We must try and keep Impervious impervious by using our brains and our brawn, and our hourly rates."

About the author
Bill Kirkendale, CISSP, has been an IT professional for fourteen years and is a former United States Marine. Please send us comments on this article.


THE KINGDOM OF IMPERVIOUS: PROTECTING THE INFRASTRUCTURE

  Protecting the infrastructure
  Creating security regualtions
  Enforcing threat prevention rules and regulations
  Risk and vulnerability assessment
  Threat and audit response
  Security awareness and education program

This was first published in March 2004

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.