[liberationtech] Designing the best network infrastructure for a.Human Rights NGO
Bill Woodcock
woody at pch.net
Thu Feb 28 05:15:53 PST 2013
Ah, yes, those expensive man-hours. Security is so much easier when you don't give it time and attention. It also doesn't work.
-Bill
On Feb 28, 2013, at 8:09, "anonymous2013 at nym.hush.com" <anonymous2013 at nym.hush.com> wrote:
> I knew this was coming at some point. Yes I am starting with
> Windows, it's more functional (awaits incoming) and costs less in
> terms of expensive man hours (the hidden cost vs software) for an
> Linux guru to run and monitor the network.
>
> On Thu, 28 Feb 2013 13:03:00 +0000 "Bill Woodcock" <woody at pch.net>
> wrote:
>> You want to do this securely, and you're _starting_ with Windows?
>>
>>
>> -Bill
>>
>>
>> On Feb 28, 2013, at 7:40, "anonymous2013 at nym.hush.com"
>> <anonymous2013 at nym.hush.com> wrote:
>>
>>> Hi,
>>> We are a human rights NGO that is looking to invest in the best
>>> possible level of network security (protection from high-level
>>> cyber-security threats, changing circumvention/proxy to protect
>> IP
>>> address etc, encryption on endpoints and server, IDS/Physical
>> and
>>> Software Firewall/File Integrity Monitoring, Mobile Device
>>> Management, Honeypots) we can get for a our internal network. I
>> was
>>> wondering if people would critique the following network, add
>>> comments, suggestions and alternative methods/pieces of
>> software.
>>> (Perhaps if it goes well we could make a short paper out of it,
>> for
>>> others to use.)
>>>
>>> -Windows 2012 Server
>>> -VMWare virtual machines running Win 8 for remote access
>>> -Industry standard hardening and lock down of all OS systems.
>>> -Constantly changing proxies
>>> -PGP email with BES
>>> -Cryptocard tokens
>>> -Sophos Enterprise Protection, Encryption and Patch management
>>> -Sophos mobile management
>>> -Encrypted voice calls for mobile and a more secure alternative
>> to
>>> Skype via Silent Circle.
>>> -TrueCrypt on all drives - set to close without use after a
>>> specific time
>>> -Easily controlled kill commands
>>> -False and poison pill files
>>> -Snort IDS
>>> -Honeypots
>>> -Tripwire
>>> -Cisco Network Appliance
>>> -No wifi
>>> -Strong physical protection in a liberal country as regards
>> human
>>> rights
>>>
>>> I know there are many other factors, good training, constant
>>> monitoring, avoiding spearfishing, penetration testing, etc but
>> if
>>> possible I would please like to keep the conversation on the
>>> network design and software.
>>>
>>> Thanks guys.
>>> -Anon
>>>
>>> --
>>> Too many emails? Unsubscribe, change to digest, or change
>> password by emailing moderator at companys at stanford.edu or
>> changing your settings at
>> https://mailman.stanford.edu/mailman/listinfo/liberationtech
>>
>> --
>> Too many emails? Unsubscribe, change to digest, or change password
>> by emailing moderator at companys at stanford.edu or changing your
>> settings at
>> https://mailman.stanford.edu/mailman/listinfo/liberationtech
>
More information about the liberationtech
mailing list