Wednesday, November 18, 2009

Ten most attention to the security of a company network


We present 10 of the biggest threats and dangerous to the security of a company's network to make you aware of security issues facing today's networks.

Over the last 10 years our world has become interconnected in ways not previously imaginable. Today, for example, people in Spain, the United States and Brazil can find along with the football star David Beckham has switched teams. Small businesses can now affordable to spread around the globe, and large businesses can now have the collaboration between offices on a daily basis. But all this interdependence is based largely on our ability to protect networks that create these links.


Unfortunately, and despite all the efforts of network security, the last five years have seen hackers and criminals are becoming increasingly effective in compromising the networks, as they have rapidly adopted new and more threats more malevolent network security.


These newly created threats have been so successful largely because most employees of companies, despite the user being Iinternet himself regularly, have no idea how these new networks attacks against the safety, and n ' have only a vague idea that new threats exist. This article will show you 10 of the biggest threats and dangerous for network security in an effort to make everyone more aware of security issues facing today's networks.

1. Viruses and Worms

The virus long term has been used generically to describe any security threat, but in reality it refers specifically to malware that inserts malicious code into documents or existing programs, and then spread by various means.


The reason why people often use threats against the computer a "virus", because viruses are the original type of malware, in fact before the public Internet. Today, viruses are still by far the most common type of threat to network security, and more than 90 percent of viruses are spread by attachments to emails. Often, the attacker will combine with a virus attack of "Zombie" (see below) so that you will receive an email with an attachment from a friend who actually contains a virus.


Prevention

The good news about viruses is that they require user action to fit on your computer. Thus, training your office staff to never open an attachment that they were not expecting, no matter who the sender is, will a very long way to keep your network virus free. Unfortunately, educate your staff on what to open the attachments are not enough to stop the worms from infecting your network. This is because although worms are also often initially delivered in the mail, they do not need a host file (for example, the seizure is necessary for an e-mail to be infected) and they can spread. Worms, unlike viruses, the spread of their own. So, once a computer is infected, the worm can often make quick copies of itself and infect a whole network within hours. Because of this unique opportunity to grow quickly through a network, worms are responsible for a number of network outages widespread enterprise.


Viruses and worms often work to create new security vulnerabilities in your network to enable security threats even more dangerous to infect your network. Therefore, there should be a priority in every society and person to use a virus protection software to limit incoming malware, and educate employees to ensure that these worms and viruses that slip through ever open .

2. Trojans

A Trojan horse is an attack by malicious software that masquerades as something innocent, like a computer game, or a YouTube page of results. A recent example of a Trojan horse used devastating an email with a link that is supposed to connect the drive to a video of the hanging of Saddam Hussein, but rather just are infected with malware. Once installed on a computer, the Trojan "Saddam" horse then downloaded and installed a keylogger on the infected computer. This keylogger was used to record each keystroke by the user of a computer to steal information and financial accounts and passwords.


The "Saddam" Trojan is remarkable only because it was so successful, but the real methods it uses to infect computer networks are not unique. In fact, the Trojans are particularly dangerous because they all seem so innocuous on the surface. Often Ttrojans be nailed to a particular website (usually adult games or games of chance), hiding in the free software download, or, as in "Saddam Trojan", a person can be infected by clicking a link sent to them in an e-mail.


Prevention

Because hackers are also creative in finding new and different types of Trojan horses, training employees on what to look not prevent the Trojans from infecting your network. However, you may want to consider blocking users from downloading free software, blocking links embedded in emails, and use a whitelist to create a list of approved sites that employees may visit. Because the Trojans are much easier to prevent than to cure, they are infected with a computer, which sometimes requires a complete reformat the hard drive, taking such drastic preventive measures may be justified for some companies.


3. Spam

The source quoted, spam accounts for 70 to 84 percent of e-mails sent daily worldwide. Anything that results in mail billion in lost productivity and creates an ever increasing need for IT resources to filter this threat irritating and potentially malicious.

Spam email takes various forms, ranging from unsolicited emails promoting products such as Viagra spam to coordinated attacks designed to meet both the bandwidth on a network so as to cause the accident. A more recent trend is image spam, which eats more bandwidth than its cousin, textual, and often bypasses spam filters that analyze the contextual text message to look for indications that the email is spam. Another brand new technique that spammers use is called "news service" spam, which uses legitimate headlines such as "Howard Stern Earns $ 83M Bonus" to trick recipients to open e-mail spam that are filled with advertisements for drugs spammy. These trends and other new spam constantly threatens the productivity of electronic mail and computer network security.


Prevention

When it comes to fighting against spam, fortunately, a lot of spam can be filtered by an email filter well. And much of what slips through can be avoided by staying updated on the latest techniques that spammers use. In addition, however, you must protect your network against spam e-mail asking your employees to use separate accounts for their personal use of the Internet, and require company accounts to be used for you register for an online service or freebie. In addition, when creating email accounts now make sure you use a naming system that is not easy to guess (eg JSmith@domain.com), because spammers are increasingly through lists of common names, to collect e-mail spam.

4. Phishing

Anyone who has ever used PayPal or do their banking online has probably received dozens of e-mails with titles such as "URGENT: Update account status." These emails are all attempts by a spammer "phishing" your account information. Phishing refers to spam e-mails designed to trick recipients into clicking on a link to a secure website. In general, phishing attempts are executed for stealing account information of e-commerce sites like eBay, processors such as PayPal payments or websites conventional financial institutions. A phishing email provides a link to click, what brings you to a page where you can re-enter all your account information, including the number of credit card (s) and / or passwords. Of course, these sites are not the site of the actual bank, even if they like it.


Mobile phones for your business may not be safe either, as SMS messaging is now commonly used as a new type of phishing SMiShing called. Once SMiShing is successful, the malware such as Trojans are sometimes placed on the mobile phone. These Trojans are text messages so expensive that go silent on the bill to the sender.


Some criminals also use the VoIP software or Voima send messages vishing. They try to mislead people by calling the number listed - usually an automated call Voip-in number - and revealing details of credit cards, which are recorded in audio form.


Prevention

Phishing in all its forms is a huge and growing problem for management of network security and business owners. As we all become more interconnected and access to information increasingly through personal networks, it becomes more and more opportunities for phishers to attack. To protect its network, it becomes increasingly vital that you educate your employees on the most common ways that hackers are trying to phish your account information. Although simplistic attempts PayPal phishing scam now seem obvious to regular Internet users, a phishing attack can only compromise the security of a network when the employee is forced to give his account information network . Even after educating your workforce, you should consider adding a header to your browser system that reminds users to never enter personal information solicited through an e-mail, and you should definitely use a email filter advanced to limit the number of phishing attacks that your employees must navigate around.

5. Packet sniffers

Packet sniffers to capture data streams over a network, allowing the capture of sensitive data such as usernames, passwords and card numbers credit. The result, unsurprisingly, is the loss of data, trade secrets, or account balances online. For network managers specifically, bigger losses may come from prosecution for non-compliance with data protection. While "packet sniffers have been used fairly innocuous ways, such as law enforcement and by corporations for purposes of compliance with data protection (HIPAA, SOX / Sarbox, Gramm-Leach-Bliley Act) The real concern for owners of network packet sniffers smarter forms. Packet sniffers work by monitoring and recording all information that comes and goes to your computer via a network compromised. Thus, to be effective, the packet sniffer must first have access to the network you use. The most common way to do it is through the use of so-called honeypots. Honeypots are simply unsecured wireless access points configuration hackers and people trapped in their use. Typically, these honeypots are configured in public places like airports, and the WiFi network is called something like "Free Public Wi-Fi". Unsuspecting people then sign on the corrupt and the network packet sniffer, then seized their personal information when they enter things like information for credit card site.

Prevention
Education is simply the best policy to deal with the threat of "packet sniffers. Once your employees know never to access the Internet via an unsecured connection, and are aware that the packet sniffers exist, they are much less likely to be victims of this type of attack. Because a single victim of espionage packets between an employee can compromise the sensitive network data, it is important that everyone learn to identify honeypots and how to ensure their own home WiFi network. In addition, make sure your employees use a variety of different sign on names and passwords to access various levels of network security. Thus, if the login information is compromised, the damage can at least be limited in scope.

6. Coded malicious websites
Maliciously coded website can take many different forms, install Trojans to redirect you to a site not requested. But one of the most menacing of maliciously coded Web sites, those designed to steal passwords, are increasing . A common form of these Web sites takes advantage of the charitable instincts of human by setting up traps in what appears to be sites that allow you to donate to victims of natural disasters like Hurricane Katrina. Hackers put up a fake sign in page and encourage unsuspecting victims to enter their number of credit card and other personal information. In addition to stealing personal information, maliciously coded websites are also often designed for the following purposes: • installation of keyloggers • Adware / spyware / reading cookies • Drive-by downloads • XSS - cross - site scripting vulnerabilities to use Web browser for other intentions.

Prevention
To protect your network, you should encourage your employees to buy only the data security of certified sites, and use PayPal instead of a credit card whenever possible, because by doing so, they will not to reveal their information from credit card to another site. In addition to limiting the number of times the information of credit card is typed into a website, payment by PayPal is also useful because maliciously coded sites are less likely to accept payments by PayPal because the owners of this account is PayPal easier to trace to an address or bank account. In addition, you should ask your employees to never sign up for new Web 2.0 applications without using a different username and password that they usually use for sensitive data. Creating a regular browser patch and update plugin will also ensure that your virus protection and e-mail addresses are current. Finally, you should always set the security settings of the browser all the computers on your network to a higher than default setting. Although this step will not eliminate the possibility that your employees may come across sites maliciously coded, it will reduce the incidence of this event.

7. Password Attacks
A 'Password Attack' is a general term that describes a variety of techniques used to steal passwords to accounts. • brute force. One of the most laborious and unsophisticated hackers using means to steal passwords is to try to guess a password by repeatedly entering into new combinations of words and phrases compiled from d ' a dictionary. This "dictionary attack" can also be used to try to guess user names and the development so difficult to guess user names and passwords increasingly vital for network security. • packet sniffers. As discussed above, packet sniffers to collect data electronically from a system compromise. • IP-Spoofing. Similar to "honey pots" this attack is the interception of data packets by a computer successfully pretending to be a trusted server / resource. • Trojans. Trojans are actually intrusive, as discussed above and these methods are most likely to be effective, especially if they install keyloggers.

Prevention
Security vulnerabilities automated testing (eg scanning a dictionary), human behavior (eg, lack of diversity in user names and passwords), and others make it easier for attackers Password succeed. Unfortunately, there is no single way to prevent attacks against the password, but combining the analysis of network traffic and fans of the old e-mail scanning, virus protection, firewall and an educated workforce can together form a solid defense to any network.

8. Loss of material and residual fragments of data
In recent months a number of government laptops have been stolen and that the story made national news. The government is so concerned about, not because of the replacement cost of some laptops, but the network vulnerabilities that loss of this material threatens to cause. In fact, the loss of equipment is a major cause of over 10 million cases of identity theft suffered by Americans each year. These types of problems are not what we often think of new threats to network security, but laptop computers stolen or sold, and computers are one of the largest threats to networks. Companies often sell older computers without completely wiping the disk clean of data, including system passwords. Just as with computers stolen, this information can then be easily used to access the network and compromise the security of the entire system.

Prevention
Fortunately, the threat of loss of material and residual fragments of data can be minimized by taking a few simple steps:

• Encrypt sensitive business, especially notebooks and folders for executives who are most likely to be targeted. When traveling through airports abroad, the problem may be particularly acute, such as laptops personalities are sometimes taken apart under the guise of "security", and their hard drives mirrored and are quickly used to blackmail the undertaking. Despite the obvious benefits of secure data, however, a recent survey revealed that 64 percent of companies were more concerned about data loss as the cost of replacement equipment, however, only 12 percent were using encyrption.

• Wipe files / tear on the old hard drives before they leave your organization. It's all about rules compliance data as it is network security. Whatever your motivation, equipment, however, failing to clean cast can leave your network vulnerable world.

• Develop a policy to keep track of employees use smart phones and USB memory cards around sensitive data. Content to let employees know that you have such a policy and monitor the use of these devices will go a long way to preventing their diversion and protect the network.

• Use a system of RFID asset management for PCs, laptops and other sensitive materials to keep an eye on their comings and goings in your premises.

9. Shared Computer
In the IT community, it is often said that computers are shared as public baths, they may be clean but are usually chock full of viruses. Fortunately, the danger of shared computers is one of network threats that can render harmless in large part by limiting the activities that you and your employees are doing.

Prevention
If you or your employees use public computers do not allow them to connect to your online accounts important, especially those containing financial details. You never know when a keylogger could be on the lookout, ready to steal your password and then the money from your company. Going beyond simply avoiding access to sensitive data through public computers, so you can avoid it, prevent your employees to connect to any network to all accounts on all public computers. If the application of this policy is difficult to simply educate your staff on the dangers of using public computers is often sufficient to eliminate most of these incidents.

10. Computers and zombie botnets
If you've ever wondered who is sitting around sending all the spam, the answer may be you. A recent New York Times article estimates that no fewer than 80 percent of spam messages are sent by computers of ordinary people who have no idea their machines have been converted into "zombies." A 'zombie' computer is simply a computer infected with malware that makes them act as a tool to silence a spammer sending thousands of emails from the email address of the owner. Infected zombie computers are organized by spammers in small groups called "botnets". These "botnets" and then send the spam that may include phishing attempts, viruses and worms. Unfortunately for network managers and business owners, the "zombie" malware threat should continue to grow in number and variety over the years. Currently, the "zombies" are used to send the types of malware include:

• Spamming and phishing attacks. T
his classic form of computers 'Zombie' is still the most common.


• The click fraud in the advertising networks.
Using a hidden agenda, zombie computers emulate human clicking on ads on a website or blog. While Google announced in December 2006 that the click fraud network for their AdSense contextual advertising is less than 2 percent, some advertisers have much higher estimates. Whatever the actual figure, creating zombie click fraud is currently a multi-million dollar, so do not expect it to stop soon.


• DoS attacks.
Your company may have competitors malicious or vindictive former employees who stoop to all levels to put your company down. In this example, your enemy can launch a denial of service attack (DoS) attack is to make the pages hosted a website or a network are no longer available for customers or employees. For example, a vengeful former employee in May to launch a DOS attack on your best day sales of the year. Accordingly, your company will lose all the cases it could be that day, because clients are unable to access your Web site.


• Pump and dump stock schemes.
In this scheme, spammers buy up a large block of a penny stock (especially sub-$ 1 per share), then use their "zombie" spam to millions of people with emails about the stock in hope that some fools take the bait and bought a share of a few thousand, thereby increasing the price. After soaring prices, the spammer then sells off its holdings and make money quickly.


Prevention
Because "botnets usually work in silence on" zombie computers "and are often allowed by the secret installation of Trojan horses, it is very difficult to tell whether a computer has been infected. Preventing 'botnets' turn PCs on your network into "zombies" requires that you educate your employees to keep all forms of security software updated and run antivirus software regularly, preferably overnight. In addition to scanning the night, train your staff to identify unusual behavior sudden your computer (s), such as persistent decelerations, a fall, as a sign they may be infected. If, despite your best efforts, a computer network is infected, treatment can vary wildly, from a single scan and remove the botnet to reformat the hard drive of your computer.

Conclusion
As the volume of financial transactions and data over the Internet, the potential for nuisance against the threats of the network also increases. Consequently, the complex security measures which were formerly held only by Fortune 500 companies such as regular security audits are increasingly a necessity even for smaller companies. While we continue to become a society increasingly networked, the financial benefits achievable by hacking into a network increases. Accordingly, it is therefore not surprising that the number of attacks and creativity deployed to try to break a network continues to grow. Therefore, those who are responsible for defending the networks must continue to educate themselves and their staff on the newest types of attacks and make the necessary preparations to prevent against them.

Additional References
The guide of 10 security threats more dangerous the network is designed as a primer to help you and your employees are aware of the many threats that a network protected from evil face. No single resource, however, can provide a thorough look at all threats to a network or the technology needed to fight against these threats. Therefore, the following list of resources should allow the curious to inquire further into the network

By John Mcquery

No comments:

Post a Comment