To: general_re; Jeff Head; Travis McGee; rdb3; Nick Danger; section9; Lazamataz; plusones
"It depends on how valuable the information stored on it is, and thus, how determined and ruthless your potential attackers are likely to be. Give me physical control of the box, physical control of you, and a pair of pliers, and I'll be on as root in less than twenty minutes, I expect. And there are plenty of installations out there where this is a very real risk - don't underestimate the utility of access control for protecting you and the system."On some very secure systems, the user is given two passwords. One password is for normal access, and the second password is for "duress" access.
Duress is when a foreign agent is beating the crap out of your wife and baby daughter until you give him a password that accesses all of your information.
Except that while the "duress" password will give said access to most or all of your critical data, it also signals your own team to come swooping in to the rescue.
In the civilian world, something very similar is done with web honeypot servers, which lure crackers in with "real looking" data and help the feds bust them.
Typically, a good honeypot server will have "valid" credit card numbers on it, for instance, but using those numbers will have the feds on you in mere minutes, as they are programmed in to the network to signal that a crime is in progress. Use the credit card number from a honeypot and you **will** get busted.
53 posted on
07/22/2003 10:42:07 PM PDT by
Southack
(Media bias means that Castro won't be punished for Cuban war crimes against Black Angolans in Africa)
To: Southack
Honeypots are fun on a whole other order of magnitude. Have pursued that with some satisfaction myself.
It's been fun, folks... but the battery gods have called my laptop home to valhalla for the evening. I'll check in in the morning.
59 posted on
07/22/2003 10:47:13 PM PDT by
Ramius
To: Southack
Duress is when a foreign agent is beating the crap out of your wife and baby daughter until you give him a password that accesses all of your information.
Except that while the "duress" password will give said access to most or all of your critical data, it also signals your own team to come swooping in to the rescue. That's great if you're the CIA or some such. For the rest of us, having a SWAT team on 24-hour standby is not exactly a practical alternative - rather, the name of the game is to prevent such attacks in the first place by controlling physical access in such a way that only authorized users get in the door. That way, the bad guy doesn't bother kidnapping you because even if he has your password, the large men stationed near the front door will prevent him from sitting down at a terminal and typing away.
65 posted on
07/22/2003 10:52:53 PM PDT by
general_re
(The wheel is turning but the hamster is dead.)
To: Southack
"
Except that while the 'duress' password will give said access to most or all of your critical data, it also signals your own team to come swooping in to the rescue."
Similar to the duress code programmed into some business and home alarms. It sends a silent alarm without requiring a response from the monitoring agent - the agent is to instantly dispatch assistance.
76 posted on
07/23/2003 5:51:21 AM PDT by
azhenfud
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson