Security Decisions
Download
Report
Transcript Security Decisions
How to Set Effective
Security Policies at Your
Organization
David Strom
VAR Business Technology Editor
June 20, 2002
My background
Author of “Home Networking Survival Guide”
book from Osborne/McGraw Hill
Founding Editor-in-Chief, Network Computing
Tested numerous networking and security
products
Things to know before you can set
effective policies
Problems with existing network and applications
infrastructure
Issues with products and protocols
Ways around the various tools that you are trying
to use to lock things down
Who is in charge, anyway?
Do you have a chief security officer?
Does s/he have any real authority?
Does s/he have control over corporate
directories, network infrastructure decisions, and
internal applications development?
Look at your exposure from within
Network admins who have rights to everything
Applications that have access to other
applications
Users who temporarily gain access outside of
their normal departments
So let’s look at the following:
VPN policies and choices
Email policies and issues
eCommerce issues
Firewalls don’t protect you all the time
Role of integrators with VPNs
Help with their rollout and configuration
Help with remote support and troubleshooting
Recommend equipment and configuration
Include as part of overall telecommuting
application
VPN Issue #1: Ease of use
VPNs still vexing
Matched pair problem
Hardware or software choices not always obvious
VPN Issue #2: Cable providers don’t
like home networks
Getting static IPs can be a problem
Changing MAC addresses is an issue
Administering and supporting a home network is
sometimes beyond their abilities or interest
… Yet all cable modems come with Ethernet!
VPN Issue #3: Providers hate VPNs
Well, maybe they are more ignorant than hate
them
Some don’t include VPNs in their TOS
Some do everything they can to discourage their
use (frequent IP changes, for example)
VPN Issue #4: Remote support
Coordinating a VPN roll out for telecommuters
can swamp a small tech support department
Variations in Windows OS, and non-Windows PCs
can be difficult!
What if users require more than one tunnel?
State of VPNs
Software now comes included in residential
gateways like Sonic and Netgear
Still too hard for the average consumer, and the
average business computer user
But wider support is inevitable
Costs too much and requires some careful
justification
VPN.net: A new way of establishing VPNs
Email policies
How accurate is your employee directory?
Do outsiders have access to your email system?
And for how long?
Do terminated employees have access still?
How often do employees copy all by mistake?
Making email secure
Use Notes or Groupwise
Don’t run Outlook, Outlook Express
Use PGP or SMIME products
eCommerce issues
Make sure you protect your enterprise network
from intrusion
Limit user access, isolate servers, lock down
scripts, harden servers
See
www.nwfusion.com/netresources/0202hack1.html
Web/database issues
Understand security weaknesses and access
controls of local database users
Understand web/database interaction from
security perspective
Understand proxy server attacks (ala Adrian
Lamo)
Block them CGI scripts!
Who is root and what can they really do?
Common mistakes with payment
processing
Provide too few or too many order confirmation
pages
Confusing methods and misplaced buttons on
order page
Make it hard for customers to buy things
Don’t make your customers read error screens
ConEd bill payment issue
Claim they needed 100,000 customers to break
even
https://m020-w5.coned.com/csol/main.asp
Note: lack of security, anyone with valid account
number can see your bill! Try acct no.
434117168910006
Preventing credit card fraud
Don't accept orders unless full address and phone
number present
Be wary of different "bill to" and "ship to" addresses
Be careful with orders from free email services
Be wary of orders that are larger than typical
amount
Pay extra attention to international orders
Ways around firewalls
Uroam.com
GoToMyPC.com
Neoteris, other appliances
Remote control software (PC Anywhere, Ccopy,
etc.)
Wireless LANs!
Remote control loopholes
Do you even know if they are running?
Do port scans for common ports that are used:
• PC Anywhere: 5631-2
• Control IT: 799
• Carbon Copy: 1680
• VNC: 5900
Wireless LAN loopholes
Do you even know if they are running?
NetStumbler.com: good resource
Read this article too.
Wireless VPN/firewall appliances
BlueSocket
ReefEdge
Vernier Networks
Mobility from Netmotion Wireless
Conclusions and questions
David Strom
Technology Editor
VAR Business magazine
[email protected]
(516) 562-7151