1. Welcome! Please take a few seconds to create your free account to post threads, make some friends, remove a few ads while surfing and much more. ClutchFans has been bringing fans together to talk Houston Sports since 1996. Join us!

[geeks] Fortune 50 Security Director asked me..I'm going to have to know what that "Black Box" is

Discussion in 'BBS Hangout' started by heypartner, Oct 11, 2014.

  1. Xerobull

    Xerobull ...and I'm all out of bubblegum
    Supporting Member

    Joined:
    Jun 18, 2003
    Messages:
    36,769
    Likes Received:
    35,607

    You must spread some reputation around before giving it to professorjay again.
     
  2. LonghornFan

    LonghornFan Member

    Joined:
    Sep 16, 2002
    Messages:
    15,718
    Likes Received:
    2,628
    [​IMG]
     
  3. ChumpCity

    ChumpCity Member

    Joined:
    Jul 31, 2009
    Messages:
    840
    Likes Received:
    240
    I am a security professional. My boss (Corporate Security Director) pays me to know what black hat/black box testing is, he has much bigger picture things on his plate. Although I'm sure he understands the concept, he may not know exact terminology - which I think is fair.

    My two questions:

    1. How do you not do your client a solid and correct any misunderstandings they may have about your audit process?

    2. How does nobody on his team think to step up and clear this up for him? Someone has to know what that means..
     
  4. ChumpCity

    ChumpCity Member

    Joined:
    Jul 31, 2009
    Messages:
    840
    Likes Received:
    240
    Scratch that - saw you covered that on a later post..
     
  5. DFWRocket

    DFWRocket Member

    Joined:
    Mar 21, 2000
    Messages:
    4,718
    Likes Received:
    2,562
    man, I miss that show.
     
  6. eric.81

    eric.81 Member

    Joined:
    Jan 3, 2002
    Messages:
    2,821
    Likes Received:
    1,492
    NO! Nobody does...

    I think I'm safe in saying - all hyperbole aside - that you're literally the only person who cares.
     
    1 person likes this.
  7. PhiSlammaJamma

    Joined:
    Aug 29, 1999
    Messages:
    29,897
    Likes Received:
    8,001
    Looks like I should be watching the IT crowd, that looked funny, and now I know where the cop comes from in the bride maid movie.

    I forget what movie it was, "but nobody f'in knows what the cloud is." Funny.

    Also lobed that commercial where the guy reaches the end of the internet. Too funny.
     
  8. Lady_Di

    Lady_Di Member

    Joined:
    Apr 11, 2007
    Messages:
    5,354
    Likes Received:
    155
    :confused:

    I feel that he should have known that...

    An IT security professional here too...
     
  9. BigShasta

    BigShasta Member

    Joined:
    Apr 26, 2014
    Messages:
    5,261
    Likes Received:
    4,894
    It's in the way you respond with words...

    perhaps you could've bee like "ma'am/sir, i can see how that's worded that it would represent an holistic object, but that's in reference to the testing method"
     
  10. torocan

    torocan Member

    Joined:
    Oct 15, 2012
    Messages:
    4,228
    Likes Received:
    436
    You would have to indicate the exact context of the use of the term "black box" that was used to give an exact answer.

    Black Box

    1) Refers to black box, or black hat testing. IE, security hacking test against a hacker that has no idea of the internal operation of the security systems in question. Usually involves 3rd party security testing/auditing in order to stress test the system's integrity under something resembling "real world" conditions.

    2) Refers to proprietary software or hardware. Financial firms often have advanced analysis algorithms that they refer to as "black box" systems. However, this is also a generic term that is sometimes used to describe any proprietary software/hardware component that uses methods and techniques that are not publicly available.

    3) (archaic) Refers to a "Black Box", a device that used a phone hacking technique prevalent in the 1970's and 1980's involving the control of the DC current on phone lines to "fool" the phone network into believing that a call was not actually being answered. This would allow a person to call another person who had the "black box" and then talk with them without being charged for the duration of the call.

    I'll assume he meant no. 1 or 2 depending on the context of the conversation and materials. Unless he's an old, old school phreaker that just happened to want to talk about the "old days" ;)
     
  11. heypartner

    heypartner Member

    Joined:
    Oct 27, 1999
    Messages:
    63,510
    Likes Received:
    59,001
    really? It's a fascinating story, imo. Puts all the companies into security categories, for me, and others agree.

    Why did Cleveland Clinic show more expertise?

    It's because the Security Director at Cleveland Clinic deals with patient records. That is the most sensitive data anyone deals with, by law.

    He's not farting around. Other Security Directors don't have much to protect except emails. Maybe you don't care about the story, but I think it's cool. And maybe this will help IT Security Professionals choose their jobs.

    Cleveland Clinic Story that helps categorize other companies

    He came in late to the call and immediately said flat out,

    "OK, what data are we talking about."

    I said: Well on a scale of 1-4, where (1) is Public Information, (2) is the source data for the Public Information, (3) is corporate proprietary data (patented data), and (4) is personal data,,,,then for your needs, we are talking about 2.5 level of data sensitivity.

    He said to his team and the buyer of the software, "Do you agree?" They said, yeah, that's about right. And he said, "Well, I don't have to be on this phone call anymore. You have my blessing" and left the phone call in a grand total of about 2 minutes.

    Like others have said, he has more important things to do. He wasn't even concerned about reading our Audit Reports.

    This is the difference for us geeks to understand


    Just because they are a Fortune 100 company does not mean they have anything more important to protect than emails and infiltration into their network (which is not much an issue with SaaS ****).

    Not all Security Officers at Fortune 500s are Equal

    just to share: I've found that companies who question me the most have the lowest score on my 1-4 rating that Cleveland Clinic scores a 4 on. Usually the ones who ask the most questions and want to make you jump through the most loops are not even a 3. That is they don't actually have proprietary product nor are consumer facing (with credit cards), much less have patient data.

    So, that's just a story I like to tell. I think the most challenging and rewarding IT Security Professional jobs/environments will be a 3 or higher.

    bottomline: imo, companies without proprietary product or personal data do not take security seriously. And the company in the OP qualifies as a 2.3 in my scale of data sensitivity.
     
    #31 heypartner, Oct 15, 2014
    Last edited: Oct 15, 2014
  12. Northside Storm

    Joined:
    Dec 24, 2007
    Messages:
    11,262
    Likes Received:
    450
    Fortune 100/200/500/4354535 talk a big game, but if I'm a black-hat sort of person (btw NSA, I am not), the first people I target are flashy startup consumer apps. Plenty more data there, and easier ins with open APIs, and third-party apps, and the probability of successful phishing is much higher (see: Dropbox, ICloud, Snapchat).

    ...in any case, in a decade or two, quantum computing will erase all permutations of SHA-2/3/4/5646456, so we'll all be on a level playing field from technically versed openy startup guys, to need-to-Wikipedia Fortune peeps. glory
     
  13. torocan

    torocan Member

    Joined:
    Oct 15, 2012
    Messages:
    4,228
    Likes Received:
    436
    You're assuming that the NSA doesn't try to pull another RSA/Clipper chip type scam. Or that they won't simply try to delay the consumer availability so that they can monopolize the technology for security and military application.

    Does anyone REALLY think that government agencies like the NSA and DOD won't be sticking in their noses when it comes to the availability of consumer Quantum computing? Or that even if Quantum computing goes mainstream that they won't use their muscle to attempt to corner the market on reliable quantum level encryption? Or that they won't attempt to compromise Quantum secure encryption algorithms with hidden back doors?

    And it's not like the US Government respects the sanctity of the patent office when it comes to this stuff... they'll happily hijack all the latest advancements for their own use without if they feel it's in the interest of national security. And unless you catch them and sue them, they won't have to pay a dime. Not to mention that they have no obligation to tell you that they're infringing your patents either.

    http://www2.law.ucla.edu/volokh/sovimm.htm

    Most likely the government will be cracking every encryption protocol in sight long before anyone in the public sphere even sniffs quantum computing. And by the time it's mainstream, it's reasonable to expect that the NSA and DOD will be doing their best to compromise every feasible quantum encryption scheme in existence.
     
  14. heypartner

    heypartner Member

    Joined:
    Oct 27, 1999
    Messages:
    63,510
    Likes Received:
    59,001
    not sure what this means. Encryption does not stop white hats from breaking into your servers. And once in, no encryption method will matter if they get root control of your encryption key server.

    The hacks you read about are largely about getting root access...that's all that's necessary to do the rest.
     
    #34 heypartner, Oct 15, 2014
    Last edited: Oct 15, 2014

Share This Page