main
side
curve
  1. In Memory of LAJ_FETT: Please share your remembrances and condolences HERE

New Security Administrator: Grilled-Sarlacc

Discussion in 'Communications' started by DarthSapient, Aug 26, 2003.

Thread Status:
Not open for further replies.
  1. Cpt_Obvious

    Cpt_Obvious Jedi Padawan star 4

    Registered:
    Mar 9, 2003
    I can give you tips. [face_laugh]

    I have a sure way to get banned, but I am not going to bring it up. In this thread at least. ;)
     
  2. Vader666

    Vader666 Jedi Knight star 5

    Registered:
    Mar 3, 2003
    Yeah Cpt Obvious

    I think you have a way dealing with bans yourself. :p

    But I did tip you didn't I?
     
  3. Cpt_Obvious

    Cpt_Obvious Jedi Padawan star 4

    Registered:
    Mar 9, 2003
    I will at least explain it. :D

    And yes, you did tip. But I think it's called bribery. [face_laugh] Another couple of weeks, right?
     
  4. Vader666

    Vader666 Jedi Knight star 5

    Registered:
    Mar 3, 2003
    No it's about another 9 days, I think. Bribe? Me!!

    Oh no I call it donation of courtesy. :D
     
  5. Dark Lady Mara

    Dark Lady Mara Manager Emeritus star 7 VIP - Former Mod/RSA

    Registered:
    Jun 19, 1999
    Donations of chocolate coins would be much appreciated.
     
  6. DarthXan318

    DarthXan318 Manager Emeritus star 6 VIP - Former Mod/RSA

    Registered:
    Sep 12, 2002
    A bit late ... but congrats GS!! :D
     
  7. Iron_Fist

    Iron_Fist Jedi Knight star 5

    Registered:
    Jan 30, 2003
    Darn... late...


    Anyway, congrats G-S!!!!!
     
  8. Kyp

    Kyp Jedi Master star 4

    Registered:
    Feb 27, 2003
    Let me repeat, what exactly does a security admin do?
     
  9. obhavekenobi78

    obhavekenobi78 Jedi Master star 5

    Registered:
    May 20, 2002
    Find and plug holes. If you want specific detail, you probably won't get it.
     
  10. Kimball_Kinnison

    Kimball_Kinnison Jedi Grand Master star 6

    Registered:
    Oct 28, 2001
    We could tell you, but then we'd ahve to ban you. :p

    Basically, a security administrator is responsible for the security of the system in general. While he does not have access to the underlying operating system or even the full board software, it is his responsibility to investigate reports of hacked accounts, stolen passwords, and similar security breaches. Additionally, he helps enforce security policies withing the ModSquad (for example, how often moderators should change their passwords).

    Kimball Kinnison
     
  11. shiningstars

    shiningstars Jedi Master star 2

    Registered:
    Mar 26, 2002
    I am late! :p congrats grilled :)
     
  12. Kyp

    Kyp Jedi Master star 4

    Registered:
    Feb 27, 2003
    Basically, a security administrator is responsible for the security of the system in general. While he does not have access to the underlying operating system or even the full board software, it is his responsibility to investigate reports of hacked accounts, stolen passwords, and similar security breaches. Additionally, he helps enforce security policies withing the ModSquad (for example, how often moderators should change their passwords).

    He's responsible to the security of the system, but he does not have access to the actual software or the OS itself? ok....

    What 'steps' does a security administrator take to investigate reports of hacked accounts, stolen passwords, etc? I was under the impression that a person without actual access to the software wouldn't be able to do anything in regards to the things you've specified.
     
  13. Kimball_Kinnison

    Kimball_Kinnison Jedi Grand Master star 6

    Registered:
    Oct 28, 2001
    What 'steps' does a security administrator take to investigate reports of hacked accounts, stolen passwords, etc? I was under the impression that a person without actual access to the software wouldn't be able to do anything in regards to the things you've specified.

    While he does not have access to the software itself, he does have access to certain logs of information. He has at his disposal tools to help him gather the information needed to investigate.

    That's all you really need to know. If we gave out too many details on it, there are ways to circumvent his ability to investigate. Some of those people know about, some they don't. In any case, we aren't exactly going to post that information for everyone to see.

    While "security through obscurity" is a bad idea by itself, in this case it can be effective in conjunction with the other tools at our disposal.

    Kimball Kinnison
     
  14. Kyp

    Kyp Jedi Master star 4

    Registered:
    Feb 27, 2003
    While he does not have access to the software itself, he does have access to certain logs of information. He has at his disposal tools to help him gather the information needed to investigate.

    I don't think the logs come etched with the bugs people use to exploit, unless Grilled-Sarlacc here can pull a Sherlock Holmes from the IP addresses.

    That's all you really need to know. If we gave out too many details on it, there are ways to circumvent his ability to investigate. Some of those people know about, some they don't. In any case, we aren't exactly going to post that information for everyone to see.

    Might that perhaps be due to the lack of any other 'tools' which you can make use of?

    While "security through obscurity" is a bad idea by itself, in this case it can be effective in conjunction with the other tools at our disposal.

    </dramatic music>
     
  15. Kimball_Kinnison

    Kimball_Kinnison Jedi Grand Master star 6

    Registered:
    Oct 28, 2001
    I don't think the logs come etched with the bugs people use to exploit, unless Grilled-Sarlacc here can pull a Sherlock Holmes from the IP addresses.

    We also have access to zerosleep, who coded up most of the boards for IGN. However, most security breaches are not done through an exploit. They are done through such things as weak passwords or people gaining access to an email account.

    For example, in the last month, I know of at least one account that was hacked because the user used his first name (listed in his profile) as his password.

    Might that perhaps be due to the lack of any other 'tools' which you can make use of?

    I work as a computer security engineer and developer. Windows viruses aside, most intrusions occur through an established account with an insecure password. I have caught many users of my systems using passwords like "password", "123456", or other such easily guessed words. When told to make it a mixuter of upper and lower case, about 90% (at the last review) only captialized the first letter. When told to add a numeric character, 75% added "1" to the end of their old password.

    Logs are more than sufficient, among other tools available, to allow the tracking of the most common intrusions.

    Kimball Kinnison
     
  16. Kyp

    Kyp Jedi Master star 4

    Registered:
    Feb 27, 2003
    We also have access to zerosleep, who coded up most of the boards for IGN. However, most security breaches are not done through an exploit. They are done through such things as weak passwords or people gaining access to an email account.

    For example, in the last month, I know of at least one account that was hacked because hte user used his first name (listed in his profile) as his password.

    I work as a computer security engineer and developer. Windows viruses aside, most intrusions occur through an established account with an insecure password. I have caught many users of my systems using passwords like "password", "123456", or other such easily guessed words. When told to make it a mixuter of upper and lower case, about 90% (at the last review) only captialized the first letter. When told to add a numeric character, 75% added "1" to the end of their old password.

    What you just described is stupidity which is far from 'security breaches'. Also, zerosleep != Grilled-Sarlacc.

    Logs are more than sufficient, among other tools available, to allow the tracking of the most common intrusions.



    You don't need the help of logs for this. You're wandering off-topic, someone setting their password as asdf doesn't count as a 'security breach'
     
  17. Kimball_Kinnison

    Kimball_Kinnison Jedi Grand Master star 6

    Registered:
    Oct 28, 2001
    What you just described is stupidity which is far from 'security breaches'. Also, zerosleep != Grilled-Sarlacc.

    Nope. A security breach is any time that a person gains access to this site that they are not supposed to have. That can include accessing it through an account not their own or accessing portions of the site that they are not authorized for (such as private forums).

    Grilled-Sarlac has responsibility for dealing with the normal security breaches, such as accounts being hacked. He also has primary responsibility for removing access to users who go inactive (for example, if a moderator disappears, he is responsible for removing their modsquad access until we hear from them again).

    zerosleep is also an administrator and is responsible for the actual security of the software. They will work together at times, but within the boards, Grilled is responsible.

    You don't need the help of logs for this. You're wandering off-topic, someone setting their password as asdf doesn't count as a 'security breach'

    You don't need the logs to identify that it happened, but they become useful in tracking down who did it. At that point, there are a host of options open to the administration, including possible legal action if so desired.

    And no, a weak password by itself is not a security breach. However, once a person other than the account owner accesses the account because ot the weak password, it is a security breach. One of Grilled-Sarlac's responsibilities is to help prevent that from happening (at least for members of the administration).

    Kimball Kinnison
     
  18. obhavekenobi78

    obhavekenobi78 Jedi Master star 5

    Registered:
    May 20, 2002
    My password is starwars. That's a good one, right?

    In any case, I don't see the point of arguing over the method in which security is applied to these forums. It doesn't seem to be too big of an issue save a few constant thorns, most of which don't normally effect the majority of posters.
     
  19. GabeC

    GabeC Jedi Youngling star 4

    Registered:
    Aug 28, 2000
    I need to visit comms more...

    Congrats man!
     
  20. DarthSapient

    DarthSapient Jedi Youngling star 10

    Registered:
    Jun 26, 2001
    Please understand that the actions taken by the security admin aren't going to be discussed beyond general descriptions. Some things aren't even discussed using computers. We don't want to publicly say how we intend to stop things like hacks. If the hacker can read private information, they most certainly have no problem reading things in Comms.
     
  21. Hob

    Hob Jedi Master star 3

    Registered:
    Aug 10, 2003
    I agree with G-S being made an admin as he is the best qualified, but the "security" part makes me giggle.
     
  22. Strilo

    Strilo Manager Emeritus star 8 VIP - Former Mod/RSA

    Registered:
    Aug 6, 2001
    Well I am late.... but congrats Grilled-Sarlaac! I know you will do well! :)

     
  23. Smuggler-of-Mos-Espa

    Smuggler-of-Mos-Espa Jedi Youngling star 6

    Registered:
    Jan 23, 2002
  24. PadmesHairstylist

    PadmesHairstylist Jedi Padawan star 4

    Registered:
    Jul 31, 2001
    If the hacker can read private information, they most certainly have no problem reading things in Comms.

    Understandable....

    If you want to truly discuss things in private concerning the security here at the JC....I'm guessing you would do so at a place/arrangement totally independant of the JC. ;)

     
  25. DarthPhelps

    DarthPhelps Jedi Master star 5

    Registered:
    Jan 31, 2002
    Congrats, G-S.

    I feel safer already.
     
Thread Status:
Not open for further replies.