Articles Service - Marketing And Unique Articles - Online Directory - Quick Promotion - Free Contents


   

Network Security - The actual Vulnerabilities



[Valid RSS feed]  Category Rss Feed - http://www.look4articles.com/rss.php?rss=32
By : Carol Martin    29 or more times read
Submitted 2011-03-14 07:39:48
Scenario: You're employed inside a corporate environment by which you are, at least partially, accountable for network security. You have implemented a firewall, virus and spyware protection, and your computers are up to date with patches and security fixes. You sit there and think about the lovely job you have done to make certain that you won't be hacked.

You have carried out, what most people think, would be the major steps towards a secure network. This really is partially correct. What about another factors?

Have you thought about a social engineering attack? What about the users who use your network every day? Are you prepared in dealing with attacks by these people?

Believe it or not, the weakest link in your security plan's the people who make use of network. Typically, users are uneducated on the procedures to identify and neutralize a social engineering attack. What's going to stop a person from getting a CD or DVD within the lunch room and taking it for their workstation and opening the files? This disk could have a spreadsheet or word processor document which has a malicious macro embedded in it. The next matter you know, your network is compromised.

This problem exists particularly in a breeding ground the place where a help-desk staff reset passwords over the telephone. There is nothing to stop a person intent on entering your network from calling the assistance desk, pretending to be a worker, and asking to possess a password reset. Most organizations use a system to generate usernames, so it's not so hard to figure them out.

Your organization must have strict policies in place to verify the identity of the user before a password reset can be achieved. One easy move to make is to possess the user navigate to the help-desk in person. The other method, which works well in case your offices are geographically far away, is to designate one contact in the office who can phone for any password reset. By doing this everyone who works on the help desk can recognize the voice of this person and realize that they're who they say they are.

Why would an opponent go to your office or make a telephone call to the help-desk? Simple, it is usually the path of least resistance. There is no need to spend hours attempting to enter a digital system when the physical product is simpler to exploit. The next time you see someone walk through the door behind you, and do not recognize them, stop and get who they really are and what they are there for. Should you choose this, and it happens to be somebody that is not supposed to be there, most of the time he'll get out as soon as possible. When the person is supposed to be there then he will in all probability be able to produce the specific person he is there to determine.

I understand you are stating that I am crazy, right? Well think of Kevin Mitnick. He is one of the most decorated hackers ever. The US government thought he could whistle tones into a telephone and launch a nuclear attack. The majority of his hacking was done through social engineering. Whether he made it happen through physical visits to offices or by looking into making a phone call, he accomplished some of the greatest hacks to date. If you wish to know more about him Google his name or browse the two books he's written.

It's beyond me why people try to dismiss these types of attacks. I guess some network engineers are simply too happy with their network to confess that they could be breached so easily. Or is it the fact that people don't feel they should be accountable for educating their employees? Most organizations don't give their IT departments the jurisdiction to promote physical security. This is usually an issue for the building manager or facilities management. None the less, if you can educate your employees the slightest bit; you may be able to prevent a network breach from the physical or social engineering attack.



Author Resource:

Franklin Publishing Group provides specialized reports for clients across the world. Our client Atlanta Computer Repair Nerds Next Door offers expert PC Repairs in Atlanta
. To learn more you need to call up Nerds Next Door at 888-596-4321

Related Articles


HTML Ready Article. Click on the "Copy" button to copy into your clipboard.




Firefox users please select/copy/paste as usual


New Members
select
Sign up
select
Learn more
ASK It!
ASK It!

 
Directory Menu
Home
Login to Directory
Submit Articles
Submission Guidelines
Top Articles
Link Directory
About Us
Articles Directory Advertisement
Articles Directory Advertisement Media Kit
Contact Us
Privacy Policy
RSS Feeds


Categories

Accessories
Advice
Aging
Arts
Arts and Crafts
Automotive
Break-up
Business
Business Management
Cancer Survival
Career
Cars and Trucks
CGI
Cheating
Coding Sites
Computers
Computers and Technology
Cooking
Crafts
Culture
Current Affairs
Databases
Death
Education
Entertainment
Etiquette
Family Concerns
Film
Finances
Food and Drinks
Gardening
Healthy Living
Holidays
Home
Home Management
Internet
Jobs
Leadership
Legal
Medical
Medical Business
Medicines and Remedies
Men Only
Motorcyles
Opinions
Our Pets
Outdoors
Parenting
Pets
Recreation
Relationships
Religion
Self Help
Self Improvement
Society
Sports
Staying Fit
Technology
Travel
Web Design
Weddings
Wellness, Fitness and Di
Women Only
Womens Interest
World Affairs
Writing
 
Actions
Print This Article
Add To Favorites
[Valid RSS feed]

Copyright LOOK 4 ARTICLES FREE DIRECTORY - 2005-2012 - Powered By: HYIP