LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 09-01-2005, 12:37 AM   #1
danimalz
Member
 
Registered: Jul 2005
Location: West Coast South, USA
Distribution: debian 3.1
Posts: 267

Rep: Reputation: 36
sleuthing


Okay.

I just had dinner & chat with my parents. My mom has an issue at work with an employee - she is supposed to apply some discipline to this employee (a suspension) because of certain 'material' found on this person's PC. This person had asked the IT dept. to look into a problem with numerous pop-ups and when they examined the HD contents they found 'materials' on the disk that are , obviously, against policy. I do not know the nature of the material or whether IT dept. have additional traffic based evidence. According to my mom, this employee is outstanding in other respects, and is due to be promoted.

(so I assume it's some kind of porn - my Mom, bless her wont tell)...

I have the following questions & I hope there's someone out there with real xperience with this field...

1. Should this person be confronted on the evidence found on the disk alone, warned, and suspended..?

2. Should this person NOT be warned, but be 'watched'; Change thier ip address and examin traffic to determine what they are doing on the net, and thereby that the material was indeed theirs?

3. Should they be warned AND watched?

4. Assuming this person isn'tt doing anything strictly illegal, and is an outstanding employee in other respects, should NOTHING be done?

I counseled my Mom that any proper IT department would have the capability to look at a given workstation (ip or mac address) and intercept all of the traffic to determine, absolutely what they are doing, looking at, etc.; and thereby build irrefutable evidence. Is this right? How would it be done - ie. would a network proxy have this capability..?

Also, I understand that someones computer could be hacked and zombied, and that a 3rd party could be using that particular computer to do bad things. Could this scenario be detected?? Do hacker's typically do this type of thing?

Last questions: Some of you are network admins.

What types of things do you do to enforce corporate policies regarding internet usage?

What kind of software can be used to track individual users..?

What would you do if this person were your friend?

What if they were your boss?

For any of you with LOTS of experience: What does a typical medium/large corporation put in place for these purposes in this day and age..?


Any input appreciated..!
Thx.
Danimalz
 
Old 09-01-2005, 04:18 AM   #2
kaverong
LQ Newbie
 
Registered: Sep 2004
Location: Philippines
Distribution: CentOS, Gentoo, Ubuntu, Redhat, Fedora. FreeBSD
Posts: 13

Rep: Reputation: 0
Since the corporate policy is already in place, it should be implemeted. If the policy is sound, i'm sure there will be heirachical diciplinary action.

re: monitoring the network traffic of individual users, that will be dubious and costly. However, should this be implmented, the company should also explicitly inform all its employees that they are being monitored. This should be done to due to privacy issues.

In the IT point of view... its easier to block/limit user activities, rather than provide them easy access to various services and then reprimand/discipline them afterwards.

Re the disciplinary action of the said employee, the severity of the offense will largely be discretionary to the management. Depending on the company's mission. Some gives values to moral responsibility others gives weight to productivity loss/gain in terms of money. But again a sound policy would only give reprimand on first offenders especially for non-serious offence.

re internet usage: the most popular would access control and filtering.
 
Old 09-01-2005, 09:18 PM   #3
danimalz
Member
 
Registered: Jul 2005
Location: West Coast South, USA
Distribution: debian 3.1
Posts: 267

Original Poster
Rep: Reputation: 36
Thanks, that's helpful..!
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:49 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration