North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: advise on network security report

  • From: Roland Dobbins
  • Date: Tue Oct 31 19:03:21 2006
  • Authentication-results: ams-dkim-2; [email protected]; dkim=pass (sig from cisco.com verified; );
  • Dkim-signature: a=rsa-sha1; q=dns; l=1112; t=1162339126; x=1163203126;c=relaxed/simple; s=amsdkim2001; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;d=cisco.com; [email protected]; z=From:Roland=20Dobbins=20<[email protected]>|Subject:Re=3A=20advise=20on=20network=20security=20report;X=v=3Dcisco.com=3B=20h=3D9yW/h6PO2gQD50qqxb+8q4gN4Uc=3D; b=wmJuaoLoz9eid9GAOTLyXRoizLtRTBZO1tB/bX9DaVVl+7ry+PlCejW5UtotashAX15idyvszaMtCros+RLgY1DARNBpnK75vLwRc04k9scmKoZUHMRvnmLBCmY1boNf;

On Oct 31, 2006, at 3:45 PM, Rick Wesson wrote:

the point of the posting are to generate discussion;
I believe there are those who would argue that there's already a surfeit of discussion on NANOG, quite a bit of it irrelevant and of little interest to many subscribers.

Posting stats and reports to a list which contains people who may not be interested in same often results in those stats and reports being filtered out and ignored. Posting a pointer to said stats and lists so that interested parties can subscribe if they so choose guarantees a community of common interests to whom discussion of the topic(s) at hand will come naturally, without the need for artificial stimulus.

-----------------------------------------------------------------------
Roland Dobbins <[email protected]> // 408.527.6376 voice

Any information security mechanism, process, or procedure which can
be consistently defeated by the successful application of a single
class of attacks must be considered fatally flawed.

-- The Lucy Van Pelt Principle of Secure Systems Design