-
Meet Hollywood Rainmaker Kevin Allyn - July 17, 2019
-
From Humble Beginnings to Great Success - February 21, 2019
-
Spotlight on Tolga Katas - February 15, 2019
-
Freedom Downtime – The Story of Legendary Hacker Kevin Mitnick - August 25, 2018
-
Steve Wozniak Corrects Inaccuracies About Jobs Movie - August 25, 2014
-
Kevin Mitnick Interview on Steven Colbert - August 25, 2014
-
Legendary Psychoanalyst Adam Phillips on Why the Capacity for Boredom Is Essential for a Full Life - July 19, 2014
-
The Psychology of Your Future Self and How Your Present Illusions Hinder Your Future Happiness - July 18, 2014
-
Media Mistake: Brian Mulligan on Bath Salts – A Story Mistold - June 20, 2014
-
Anna Deavere Smith on Discipline and How We Can Learn to Stop Letting Others Define Us - June 16, 2014
Network Security – The Real Vulnerabilities
You have done, what most people think, are the major steps towards a secure network. This is partially correct. What about the other factors?
Scenario: You work in a corporate environment in which you are, at least partially, responsible for network security. You have implemented a firewall, virus and spyware protection, and your computers are all up to date with patches and security fixes. You sit there and think about the lovely job you have done to make sure that you will not be hacked.
You have done, what most people think, are the major steps towards a secure network. This is partially correct. What about the other factors?
Have you thought about a social engineering attack? What about the users who use your network on a daily basis? Are you prepared in dealing with attacks by these people?
Believe it or not, the weakest link in your security plan is the people who use your network. For the most part, users are uneducated on the procedures to identify and neutralize a social engineering attack. What’s going to stop a user from finding a CD or DVD in the lunch room and taking it to their workstation and opening the files? This disk could contain a spreadsheet or word processor document that has a malicious macro embedded in it. The next thing you know, your network is compromised.
This problem exists particularly in an environment where a help desk staff reset passwords over the phone. There is nothing to stop a person intent on breaking into your network from calling the help desk, pretending to be an employee, and asking to have a password reset. Most organizations use a system to generate usernames, so it is not very difficult to figure them out.
Your organization should have strict policies in place to verify the identity of a user before a password reset can be done. One simple thing to do is to have the user go to the help desk in person. The other method, which works well if your offices are geographically far away, is to designate one contact in the office who can phone for a password reset. This way everyone who works on the help desk can recognize the voice of this person and know that he or she is who they say they are.
Why would an attacker go to your office or make a phone call to the help desk? Simple, it is usually the path of least resistance. There is no need to spend hours trying to break into an electronic system when the physical system is easier to exploit. The next time you see someone walk through the door behind you, and do not recognize them, stop and ask who they are and what they are there for. If you do this, and it happens to be someone who is not supposed to be there, most of the time he will get out as fast as possible. If the person is supposed to be there then he will most likely be able to produce the name of the person he is there to see.
I know you are saying that I am crazy, right? Well think of Kevin Mitnick. He is one of the most decorated hackers of all time. The US government thought he could whistle tones into a telephone and launch a nuclear attack. Most of his hacking was done through social engineering. Whether he did it through physical visits to offices or by making a phone call, he accomplished some of the greatest hacks to date. If you want to know more about him Google his name or read the two books he has written.
It’s beyond me why people try and dismiss these types of attacks. I guess some network engineers are just too proud of their network to admit that they could be breached so easily. Or is it the fact that people don’t feel they should be responsible for educating their employees? Most organizations don’t give their IT departments the jurisdiction to promote physical security. This is usually a problem for the building manager or facilities management. None the less, if you can educate your employees the slightest bit; you may be able to prevent a network breach from a physical or social engineering attack.
Dennis d’Entremont is the operator of SaveLoad Video Game Directory and Computers-Made-Easy.com
Author: Dennis DEntremont
Article Source: EzineArticles.com
Provided by: PCB Prototype & Manufacturing
6,651 Comments on this Post
Teknik Servis
Professionel!
all on 4 dental implants cost
Really useful article! I love your work, keep it up!
diksiyon kursu
türkiyenin en iyi diksiyon kursu hemen başlayın
aile danışmanlığı eğitimi
en iyi aile danışmanlı kursu sizde hemen başlayın
tornado.cash
TornadoCash: Where privacy meets decentralization. Keep your Ethereum transactions confidential with this innovative protocol
izmir haberleri
izmir haberleri ve engüncel gelişmeler
medya eskil
medya eskil
burun estetiği ankara
ankara en iyi burun estetiği doktoru
By Casino
Good info. Lucky me I reach on your website by accident, I bookmarked it.
By Casino
Thank you for great content. Hello Administ.
eskil haber
eskil haber
bycasino
Nice article inspiring thanks. Hello Administ .
bycasino
Thank you great post. Hello Administ .
aile dizimi eğitimi
aile dizimi eğitimi için şimdi başvurun
oyun forumu
en iyi oyun paylaşımlarının olduğu oyun forumu jetto
çocuk doktoru ankara
en iyi çocuk doktoru
4d scan near me
Hi there! I stumbled upon your website while looking into ‘4D ultrasound services near me.’ Your content is not only informative but also engaging. As I explore options for a ‘4D scan near me,’ I’m curious about your recommendations or any additional insights you might have. Thank you in advance!
baby scan near me
Hello! Your site came up in my search for ‘baby ultrasound services near me.’ Your content is both informative and reassuring. As I’m looking for a reliable ‘baby scan near me,’ any insights or recommendations you could provide would be greatly valued. Thanks in advance!
tornadocash
Looking for anonymity in your Ethereum transactions? Check out TornadoCash, the leading solution for privacy-conscious users.
tornade cash
TornadoCash: Where privacy meets decentralization. Keep your Ethereum transactions confidential with this innovative protocol
tornado cash relayer
mixer tornado cash
emergency pregnancy scan
Greetings! I found your site while looking into ’emergency pregnancy scan services.’ The content is both reassuring and informative. In need of an ’emergency pregnancy scan,’ I’m interested in any advice or insights you may have. Thank you in advance!
child porn
porn tube
kadıköy masaj salonu
İstanbul Bölgesinde bulunan en iyi masaj salonları ve masaj hizmetini arıyorsan doğru adrestesin diyebiliriz çünkü sizler için en iyi terapistleri ile masaj merkezlerini araştırır ve sadece en iyilerini sitesinde yayınlar.
https://medyaeskil.com/ak-parti-eskil-il-genel-meclis-uyeleri/
https://medyaeskil.com/ak-parti-eskil-il-genel-meclis-uyeleri/
porno sarışın
pornolar.net full hd video izle
buca izmir escort
Navert.net Buca eskort bayan
lidyabet
Yeni twitter sayfamızı ziyaret edebilirsiniz
aile dizimi
aile dizmi nedir nasıl yapılır
aile dizimi eğitimi
aile dizimi eğitimi için başvurun
buca escort
fantasyescortblogs eksii
İzmir'de bugün hava nasıl olacak? İşte saatlik hava durumu 27.02.2024
İzmir’de bugün hava durumu nasıl olacak? İzmir’de ne zaman güneş açacak? İzmir’de hava sıcaklıkları kaç derece? İzmir’de saatlik hava durumu…
Adanaspor, Giresunspor deplasmanında 3 puan hedefliyor
TFF Trendyol 1. Lig takımlarından Adanaspor, ligin 25. Haftasında deplasmanda karşılaşacağı Giresunspor deplasmanında 3 puan hedefliyor.
bdt eğitimi
bdt eğitimi hemen başla
ankara seo
Kurumsal dijital hizmetler sunuyoruz. Ankara web tasarım ve ankara seo ajansı ket web harikalar yaratır.
rise online world cash satın al
Rise Online World Cash Satın Al işlemlerinde güvenilir ve hızlı hizmet için OyunSoft’u tercih etmek her zaman en doğru seçenek.
aresbet
aresbet giriş için tıkladım ve girdim teşekkürler
kazandra
kazandra giriş için tıkladım ve siteye ulaştım teşekkürler.
istanbul vip transfer
istanbul vip transfer
Core 300 Replacement 3-in-1 HEPA Filters Compatible with LEVOIT Core 300 Air Purifier Part Number Core 300-RF
Great job great content thank you xxx
Xerox VersaLink C405dn A4 35ppm Colour Multifunction Laser Printer with Duplex 2-Sided Printing
Awesome content very usefull thank you
https://medyaeskil.com/ak-parti-eskil-belediye-baskan-adayi-mustafa-zavlak/
https://medyaeskil.com/ak-parti-eskil-belediye-baskan-adayi-mustafa-zavlak/
super clone rolex
super clone rolex
haber
thanks you
escort mersin
mersin kızlarını anlamak kolaydır
ankara dehb
Dikkatim dağınık, hiperaktif, dürtüsel bir çocuksam eğer…
haber
thanks
Ankara internet sitesi tasarımı
Ankara internet sitesi tasarımı
lidyabet giriş
Yenilenen lidyabet adresimizle sizlerleyiz sitemizi inceleyin
No7 Men Energising Moisturiser x 50ml
Martin great job awesome website