We present 10 of the biggest threats and dangerous to the security of a company's network to make you aware of security issues facing today's networks.
1. Viruses and Worms
Prevention
Viruses and worms often work to create new security vulnerabilities in your network to enable security threats even more dangerous to infect your network. Therefore, there should be a priority in every society and person to use a virus protection software to limit incoming malware, and educate employees to ensure that these worms and viruses that slip through ever open .
2. Trojans
Prevention
3. Spam
The source quoted, spam accounts for 70 to 84 percent of e-mails sent daily worldwide. Anything that results in mail billion in lost productivity and creates an ever increasing need for IT resources to filter this threat irritating and potentially malicious.
Prevention
4. Phishing
Prevention
5. Packet sniffers
Packet sniffers to capture data streams over a network, allowing the capture of sensitive data such as usernames, passwords and card numbers credit. The result, unsurprisingly, is the loss of data, trade secrets, or account balances online. For network managers specifically, bigger losses may come from prosecution for non-compliance with data protection. While "packet sniffers have been used fairly innocuous ways, such as law enforcement and by corporations for purposes of compliance with data protection (HIPAA, SOX / Sarbox, Gramm-Leach-Bliley Act) The real concern for owners of network packet sniffers smarter forms. Packet sniffers work by monitoring and recording all information that comes and goes to your computer via a network compromised. Thus, to be effective, the packet sniffer must first have access to the network you use. The most common way to do it is through the use of so-called honeypots. Honeypots are simply unsecured wireless access points configuration hackers and people trapped in their use. Typically, these honeypots are configured in public places like airports, and the WiFi network is called something like "Free Public Wi-Fi". Unsuspecting people then sign on the corrupt and the network packet sniffer, then seized their personal information when they enter things like information for credit card site.
Prevention
Education is simply the best policy to deal with the threat of "packet sniffers. Once your employees know never to access the Internet via an unsecured connection, and are aware that the packet sniffers exist, they are much less likely to be victims of this type of attack. Because a single victim of espionage packets between an employee can compromise the sensitive network data, it is important that everyone learn to identify honeypots and how to ensure their own home WiFi network. In addition, make sure your employees use a variety of different sign on names and passwords to access various levels of network security. Thus, if the login information is compromised, the damage can at least be limited in scope.
6. Coded malicious websites
Maliciously coded website can take many different forms, install Trojans to redirect you to a site not requested. But one of the most menacing of maliciously coded Web sites, those designed to steal passwords, are increasing . A common form of these Web sites takes advantage of the charitable instincts of human by setting up traps in what appears to be sites that allow you to donate to victims of natural disasters like Hurricane Katrina. Hackers put up a fake sign in page and encourage unsuspecting victims to enter their number of credit card and other personal information. In addition to stealing personal information, maliciously coded websites are also often designed for the following purposes: • installation of keyloggers • Adware / spyware / reading cookies • Drive-by downloads • XSS - cross - site scripting vulnerabilities to use Web browser for other intentions.
Prevention
To protect your network, you should encourage your employees to buy only the data security of certified sites, and use PayPal instead of a credit card whenever possible, because by doing so, they will not to reveal their information from credit card to another site. In addition to limiting the number of times the information of credit card is typed into a website, payment by PayPal is also useful because maliciously coded sites are less likely to accept payments by PayPal because the owners of this account is PayPal easier to trace to an address or bank account. In addition, you should ask your employees to never sign up for new Web 2.0 applications without using a different username and password that they usually use for sensitive data. Creating a regular browser patch and update plugin will also ensure that your virus protection and e-mail addresses are current. Finally, you should always set the security settings of the browser all the computers on your network to a higher than default setting. Although this step will not eliminate the possibility that your employees may come across sites maliciously coded, it will reduce the incidence of this event.
7. Password Attacks
A 'Password Attack' is a general term that describes a variety of techniques used to steal passwords to accounts. • brute force. One of the most laborious and unsophisticated hackers using means to steal passwords is to try to guess a password by repeatedly entering into new combinations of words and phrases compiled from d ' a dictionary. This "dictionary attack" can also be used to try to guess user names and the development so difficult to guess user names and passwords increasingly vital for network security. • packet sniffers. As discussed above, packet sniffers to collect data electronically from a system compromise. • IP-Spoofing. Similar to "honey pots" this attack is the interception of data packets by a computer successfully pretending to be a trusted server / resource. • Trojans. Trojans are actually intrusive, as discussed above and these methods are most likely to be effective, especially if they install keyloggers.
Prevention
Security vulnerabilities automated testing (eg scanning a dictionary), human behavior (eg, lack of diversity in user names and passwords), and others make it easier for attackers Password succeed. Unfortunately, there is no single way to prevent attacks against the password, but combining the analysis of network traffic and fans of the old e-mail scanning, virus protection, firewall and an educated workforce can together form a solid defense to any network.
8. Loss of material and residual fragments of data
In recent months a number of government laptops have been stolen and that the story made national news. The government is so concerned about, not because of the replacement cost of some laptops, but the network vulnerabilities that loss of this material threatens to cause. In fact, the loss of equipment is a major cause of over 10 million cases of identity theft suffered by Americans each year. These types of problems are not what we often think of new threats to network security, but laptop computers stolen or sold, and computers are one of the largest threats to networks. Companies often sell older computers without completely wiping the disk clean of data, including system passwords. Just as with computers stolen, this information can then be easily used to access the network and compromise the security of the entire system.
Prevention
Fortunately, the threat of loss of material and residual fragments of data can be minimized by taking a few simple steps:
• Encrypt sensitive business, especially notebooks and folders for executives who are most likely to be targeted. When traveling through airports abroad, the problem may be particularly acute, such as laptops personalities are sometimes taken apart under the guise of "security", and their hard drives mirrored and are quickly used to blackmail the undertaking. Despite the obvious benefits of secure data, however, a recent survey revealed that 64 percent of companies were more concerned about data loss as the cost of replacement equipment, however, only 12 percent were using encyrption.
• Wipe files / tear on the old hard drives before they leave your organization. It's all about rules compliance data as it is network security. Whatever your motivation, equipment, however, failing to clean cast can leave your network vulnerable world.
• Develop a policy to keep track of employees use smart phones and USB memory cards around sensitive data. Content to let employees know that you have such a policy and monitor the use of these devices will go a long way to preventing their diversion and protect the network.
• Use a system of RFID asset management for PCs, laptops and other sensitive materials to keep an eye on their comings and goings in your premises.
9. Shared Computer
In the IT community, it is often said that computers are shared as public baths, they may be clean but are usually chock full of viruses. Fortunately, the danger of shared computers is one of network threats that can render harmless in large part by limiting the activities that you and your employees are doing.
Prevention
If you or your employees use public computers do not allow them to connect to your online accounts important, especially those containing financial details. You never know when a keylogger could be on the lookout, ready to steal your password and then the money from your company. Going beyond simply avoiding access to sensitive data through public computers, so you can avoid it, prevent your employees to connect to any network to all accounts on all public computers. If the application of this policy is difficult to simply educate your staff on the dangers of using public computers is often sufficient to eliminate most of these incidents.
10. Computers and zombie botnets
If you've ever wondered who is sitting around sending all the spam, the answer may be you. A recent New York Times article estimates that no fewer than 80 percent of spam messages are sent by computers of ordinary people who have no idea their machines have been converted into "zombies." A 'zombie' computer is simply a computer infected with malware that makes them act as a tool to silence a spammer sending thousands of emails from the email address of the owner. Infected zombie computers are organized by spammers in small groups called "botnets". These "botnets" and then send the spam that may include phishing attempts, viruses and worms. Unfortunately for network managers and business owners, the "zombie" malware threat should continue to grow in number and variety over the years. Currently, the "zombies" are used to send the types of malware include:
• Spamming and phishing attacks. T
his classic form of computers 'Zombie' is still the most common.
• The click fraud in the advertising networks.
Using a hidden agenda, zombie computers emulate human clicking on ads on a website or blog. While Google announced in December 2006 that the click fraud network for their AdSense contextual advertising is less than 2 percent, some advertisers have much higher estimates. Whatever the actual figure, creating zombie click fraud is currently a multi-million dollar, so do not expect it to stop soon.
• DoS attacks.
Your company may have competitors malicious or vindictive former employees who stoop to all levels to put your company down. In this example, your enemy can launch a denial of service attack (DoS) attack is to make the pages hosted a website or a network are no longer available for customers or employees. For example, a vengeful former employee in May to launch a DOS attack on your best day sales of the year. Accordingly, your company will lose all the cases it could be that day, because clients are unable to access your Web site.
• Pump and dump stock schemes.
In this scheme, spammers buy up a large block of a penny stock (especially sub-$ 1 per share), then use their "zombie" spam to millions of people with emails about the stock in hope that some fools take the bait and bought a share of a few thousand, thereby increasing the price. After soaring prices, the spammer then sells off its holdings and make money quickly.
Prevention
Because "botnets usually work in silence on" zombie computers "and are often allowed by the secret installation of Trojan horses, it is very difficult to tell whether a computer has been infected. Preventing 'botnets' turn PCs on your network into "zombies" requires that you educate your employees to keep all forms of security software updated and run antivirus software regularly, preferably overnight. In addition to scanning the night, train your staff to identify unusual behavior sudden your computer (s), such as persistent decelerations, a fall, as a sign they may be infected. If, despite your best efforts, a computer network is infected, treatment can vary wildly, from a single scan and remove the botnet to reformat the hard drive of your computer.
Conclusion
As the volume of financial transactions and data over the Internet, the potential for nuisance against the threats of the network also increases. Consequently, the complex security measures which were formerly held only by Fortune 500 companies such as regular security audits are increasingly a necessity even for smaller companies. While we continue to become a society increasingly networked, the financial benefits achievable by hacking into a network increases. Accordingly, it is therefore not surprising that the number of attacks and creativity deployed to try to break a network continues to grow. Therefore, those who are responsible for defending the networks must continue to educate themselves and their staff on the newest types of attacks and make the necessary preparations to prevent against them.
Additional References
The guide of 10 security threats more dangerous the network is designed as a primer to help you and your employees are aware of the many threats that a network protected from evil face. No single resource, however, can provide a thorough look at all threats to a network or the technology needed to fight against these threats. Therefore, the following list of resources should allow the curious to inquire further into the network
By John Mcquery
No comments:
Post a Comment