CARI Infonet

 Forgot password?
 Register

ADVERTISEMENT

View: 3616|Reply: 3

Reducing "Human Factor" Mistakes

[Copy link]
Post time 10-3-2004 05:49 AM | Show all posts |Read mode
Nowadays companies and organizations face the problem where massive attempts at illegal intrusions hit their network on a daily basis. In spite of the latest technological improvements in security, it's still the network users who are often unknowingly inviting security breaches through carelesnes and a lack of awareness. This paper will try to summarize various mistakes done by system administrators, company executives and of course the end users, and will also provide you with useful strategies that will definitely help you reduce or completely eliminate the mistakes.

Nowadays companies and organizations face the problem where massive attempts at illegal intrusions hit their network on a daily basis. Whether successful or not, they still pose a significant threat to the proper functionality and continuity of the institution's processes. The majority of these institutions tend to think that any future security related implementations would cost too much effort and resources and place a burden on the budget. On the other hand, the constant media reports of large and well-known corporations broken into really discourage them.

In spite of the latest technological improvements, it's still us, those interacting and configuring these devices/programs; it's our staff members, the ones unknowingly contributing to the dissemination of malicious code, to the exposure of sensitive or classified business information.

This paper will try to summarize various mistakes done by System Administrators, Company Executives and of course the end users, and will also provide you with useful strategies that will definitely help you reduce or completely eliminate the mistakes.

The Top 5 System Administrator Mistakes

System Administrators are those mainly responsible for the continued operation of your computers and for the proper functionality of your network, however in most of the organizations these people are also responsible for the Security of the devices, the detection of potential intrusions and securing the organization's network. Taking a lot of responsibilities increases the number of potential mistakes by the individual due to the stress and the constant work on several issues simultaneously. Here I'll review the most common mistakes done by System Administrators which could somehow endanger your organization and the sensitive data you're holding.

1. The lack of a well established Personal Security Policy
Believe it or not, most of the average System Administrators don't have a personal Security Policy covering important issues like Physical Security of the terminal, the chaotic way a system's software is being updated and the way that new patches are applied. Even the big and well-known companies suffer from the fact that some of their systems are not patched as soon as a new bug is discovered, another proof of the importance of this issue.

Sometimes the Administrator isn't even aware of the latest vulnerabilities discovered, which could lead to a potential security breach within the organization. Security is a never-ending process that requires constant monitoring of new threats and technologies. Although most of the Administrators are not Security Experts they should continue to learn about new and much more powerful methods to protect and secure their networks, while on the other hand increase their competitiveness. Nowadays those having some sort of Security certification or extended knowledge in the Information Security field are usually a step ahead of those whose skills are up to networking only. Below I've tried to summarize various recommendations and tips for improving the Security of your terminal, organization and broaden your knowledge on the subject.

    *Physically secure your terminal and working place, realize the dangers of malicious "snoopers" walking around your workplace, having access to your terminal.
    *Logout each time your leave the terminal, or set up a time out, so even if you forget to logout, the system will be protected once it detects you're not in front of the keyboard.
    *Consider subscribing to various Security related newsletters, mailing lists with the idea to keep an eye on the latest vulnerabilities discovered.
    *Visiting the appropriate exploits related web sites is an important process acting as an early warning system for potential intrusions due to outdated or unpatched software.
    *Reading the latest Security related white papers is an essential step of the Administrator's self education process, which ensures he/she is up to date with the latest topics discussed over the community.
    *Limit the use of notes and papers for any sensitive information such as passwords, IP's and anything that might help a potential intruder gain access to your systems. However if you use these, shred and destroy them each time before you leave your work place. Malicious "snoopers" around the workplace might take advantage of this well known weakness, so limit or completely eliminate the use of these notes.

2.  Connecting misconfigured systems to the Internet
    *With the ever-expanding company's needs, new systems and servers are connected to the Internet on a regular basis, thereby increasing the current level of productivity or significantly limiting the overall expenses of the institution. However, most of these systems are connected to the Internet without the proper Security Auditing, thus being exposed to malicious attackers by the time a proper Security Audit is done.

The majority of Administrators mainly rely on the fact that the system is new, no one knows about it, no one knows its reserved IP, and so it will be impossible to break into something you don't know that exists. However, this mode of thinking represents a threat to any organization. There are people or automated scripts scanning the Internet, or specific company's network, especially for such "test systems" with the idea to break into them, hide within, and use the system for committing further illegal activities. And how about if someone knew the right day, time and the IP reserved for the system, through advanced social engineering techniques, how about if someone is non-stop stealthily scanning your network for such systems? Realize the dangers and take the appropriate measures by following some recommendations listed below.

    *Conduct a complete Security Audit of the system, before you physically connect it to your network.
    *Make sure the system has the latest versions of the software, installed and securely configured.
    *If there are network tests that need to be done, consider blocking the access to the test system from the Internet.
    *Verify that the system you're about to connect doesn't contain any sensitive data yet.
    *You might be interested in how often the new system is probed for various vulnerabilities. Install an Intrusion Detection System, and I'm sure you'll be surprised at the number of scans within the first day.

3.  Relying on tools
Vulnerability scanners are often used to gather information about the current level of Security within the network scanned. Host Vulnerability Scanners are very useful in checking the Security within the host, like file permissions, passwords policies and many other issues related to potential local break-in. On the other hand, Network Vulnerability Scanners provide the Administrator with the hacker's point of view on the network, highly beneficial tools as far as Penetration Testing is concerned. Generally, these scanners would eliminate half of the potential security problems within the system, however they're not a complete solution in order to achieve maximum level of Security. Admins tend to run as many Vulnerability scanners, as possible thinking that the more they run, the higher is the chance to eliminate all the problems. Wrong mode of thinking, and there're even cases where inappropriate scanners are ran to check the Security of an OS they're not specifically created for. Indeed, Vulnerability scanners can save you a lot of time, resources and troubles, but they're not a complete solution and you should not rely only on these. Instead, learn more about the Security of the OS you're running, so that you'll be able to manually (or via some sort of scripts created for your very specific needs) eliminate potential Security problems that cannot be discovered by any Vulnerability scanner.

4. Failing to monitor the logs
Monitoring the system's logs is an essential step in detecting ongoing or forthcoming intrusions. It will help you understand the common vulnerabilities, attackers are scanning for, so that you'll be able to verify all of your systems are protected against specific attack. In case of an intrusion, it's your system logs that might help you trace back the attacker, if they're not modified of course. Realize the benefits of regularly checking and securely storing your log files, while on the other hand a contribution to the scene will help everyone. Dshield.org is a reasonable example.

5.  Running extra and unnecessary services/scripts
Using the company's resources and network as a personal playground for testing various scripts and services, is another common mistake done by the average Administrator. Having these scripts and extra services running, results in a variety of potential new entry points for a malicious attacker, and let's not mention if this is done from the main server. If you really need to test scripts, run extra services for personal issues, consider doing it from an isolated computer, not connected to the network, while still having Internet access, thus limiting the chances of someone discovering these services and scripts.
Reply

Use magic Report


ADVERTISEMENT


 Author| Post time 10-3-2004 05:54 AM | Show all posts
The Top 5 Company Executive Mistakes

Company Executives are those managing and dealing with the company's resources, budget, those who are responsible for leading and expanding the institution. Nowadays, the Internet offers amazing advantages for any company worldwide. The term E-business is getting more popular and E-business Strategy is an issue included in every Business Plan. However, the global connectivity represents a threat to the sensitive information if the company is lacking a Security strategy. I抣l try to summarize common mistakes done by the Company Executives that could possibly contribute to a Security breach.

1.  Employing untrained and inexperienced experts
Without a doubt, every highly qualified and experienced Expert is a valuable asset to any company's resources. However their qualification and professional abilities require the Executive or the one responsible for employing them, to have extended knowledge on the issue, thereby hiring the appropriate person for the right job. Having a basic understanding of various, if not the most popular certifications, ensures that you'll be able to make the best decision. I would advise you to take a look at gocertify.com/security in order to deepen your knowledge on the most popular Security/Network certifications available.

2.  Failing to realize to consequences of a potential security breach
By realizing the devastating consequences of the problem, and eliminating the "This won't happen to us" mode of thinking, you'll be able to properly react instead of endangering your company's business activities due to lack of understanding the issue.

    *Damaging other businesses online, by contributing to a DDoS attack
    *Storing illegal information and unknowingly distributing it due to an undetected intrusion
    *Exposing sensitive customer's information to a malicious attacker, thus endangering their privacy
    *Damaging the company's image, loss of customers, loss of partner trust

And it's just the tip of the iceberg, realize the consequences and take the appropriate actions.

3.  Not spending enough money on the Information Security issue
Convincing a Company's Executive on the benefits or the potential losses of proper/improper management of the Information Security budget can be a difficult task. Managers tend to limit the budget to the minimum because of their failure to realize the potential damages to the company, or sometimes it's the budget that limits them. Internet as a global network offers unlimited and fascinating opportunities for every Business out there, once the Information Security issue is well taken care of. Consider conducting a Risk Analyses, so that you'll be able to distinguish critical or less critical systems, thus fitting in the budget, while on the other hand have your sensitive systems properly protected.

4. Relying mainly on commercial tools and products
"We use a world-known firewall, and a server based virus protection, so we are secured against hackers attacks" is one of the most common answers on "How is your company protected against hackers?
Reply

Use magic Report

MaUi^ This user has been deleted
Post time 11-3-2004 01:35 PM | Show all posts
nak reduce "fear factor" camne?
Reply

Use magic Report

 Author| Post time 12-3-2004 05:50 AM | Show all posts
fear factor? hehe tu kena mengaji ngan makcik sarah anak atuk radzi lah :lol
Reply

Use magic Report

You have to log in before you can reply Login | Register

Points Rules

 

ADVERTISEMENT



 

ADVERTISEMENT


 


ADVERTISEMENT
Follow Us

ADVERTISEMENT


Mobile|Archiver|Mobile*default|About Us|CariDotMy

14-5-2024 11:59 AM GMT+8 , Processed in 0.058625 second(s), 30 queries .

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

Quick Reply To Top Return to the list