19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 18: Managing Security Processes<br />

✓ Do you know exactly who will perform the tests? Will one person do<br />

the testing, or will subject-matter experts focus on the different areas?<br />

(This isn’t a deal breaker but is nice to know.)<br />

✓ Does the provider have the experience to recommend practical and<br />

effective countermeasures to the vulnerabilities found? The provider<br />

shouldn’t just hand you a think report and say, “Good luck with all that!”<br />

You need realistic solutions.<br />

✓ What are the provider’s motives? Do you get the impression that the<br />

provider is in business to make a quick buck off the services, with minimal<br />

effort and value added, or is the provider in business to build loyalty<br />

with you and establish a long-term relationship?<br />

Finding a good organization to work with long term will make your ongoing<br />

efforts much simpler. Ask for several references and sample sanitized deliverables<br />

(that is, reports that don’t contain sensitive information) from potential<br />

providers. If the organization can’t produce these without difficulty, look for<br />

another provider.<br />

Your provider should have its own service agreement for you that includes a<br />

mutual nondisclosure statement. Make sure you both sign this to help<br />

protect your organization.<br />

Thinking about hiring a reformed hacker?<br />

Former hackers — I’m referring to the black-hat<br />

hackers who have hacked into computer systems<br />

in the past — can be very good at what<br />

they do. Many people swear by hiring reformed<br />

hackers to do ethical hacking. Others compare<br />

this to hiring the proverbial fox to guard the hen<br />

house. If you’re thinking about bringing in a<br />

former unethical hacker to test your systems,<br />

consider these issues:<br />

✓ Do you really want to reward malicious<br />

behavior with your organization’s business?<br />

✓ Claiming to be reformed doesn’t mean he or<br />

she is. There could be deep-rooted psychological<br />

issues or character flaws you’re going<br />

to have to contend with. Buyer beware!<br />

✓ Information gathered and accessed during<br />

ethical hacking is some of the most sensitive<br />

information your organization possesses. If<br />

this information gets into the wrong hands —<br />

even ten years down the road — it could<br />

be used against your organization. Some<br />

hackers and reformed criminals hang out<br />

in tight social groups. You might not want<br />

your information shared in their circles.<br />

That said, everyone deserves a chance to<br />

explain what happened in the past. Zero tolerance<br />

is senseless. Listen to his or her story and<br />

use common-sense discretion as to whether<br />

you trust the person to help you. The supposed<br />

black-hat hacker actually might have been<br />

a gray-hat hacker or a misguided white-hat<br />

hacker who fits well in your organization.<br />

335

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!