-
Meet Hollywood Rainmaker Kevin Allyn - July 17, 2019
-
From Humble Beginnings to Great Success - February 21, 2019
-
Spotlight on Tolga Katas - February 15, 2019
-
Freedom Downtime – The Story of Legendary Hacker Kevin Mitnick - August 25, 2018
-
Steve Wozniak Corrects Inaccuracies About Jobs Movie - August 25, 2014
-
Kevin Mitnick Interview on Steven Colbert - August 25, 2014
-
Legendary Psychoanalyst Adam Phillips on Why the Capacity for Boredom Is Essential for a Full Life - July 19, 2014
-
The Psychology of Your Future Self and How Your Present Illusions Hinder Your Future Happiness - July 18, 2014
-
Media Mistake: Brian Mulligan on Bath Salts – A Story Mistold - June 20, 2014
-
Anna Deavere Smith on Discipline and How We Can Learn to Stop Letting Others Define Us - June 16, 2014
Network Security – The Real Vulnerabilities
You have done, what most people think, are the major steps towards a secure network. This is partially correct. What about the other factors?
Scenario: You work in a corporate environment in which you are, at least partially, responsible for network security. You have implemented a firewall, virus and spyware protection, and your computers are all up to date with patches and security fixes. You sit there and think about the lovely job you have done to make sure that you will not be hacked.
You have done, what most people think, are the major steps towards a secure network. This is partially correct. What about the other factors?
Have you thought about a social engineering attack? What about the users who use your network on a daily basis? Are you prepared in dealing with attacks by these people?
Believe it or not, the weakest link in your security plan is the people who use your network. For the most part, users are uneducated on the procedures to identify and neutralize a social engineering attack. What’s going to stop a user from finding a CD or DVD in the lunch room and taking it to their workstation and opening the files? This disk could contain a spreadsheet or word processor document that has a malicious macro embedded in it. The next thing you know, your network is compromised.
This problem exists particularly in an environment where a help desk staff reset passwords over the phone. There is nothing to stop a person intent on breaking into your network from calling the help desk, pretending to be an employee, and asking to have a password reset. Most organizations use a system to generate usernames, so it is not very difficult to figure them out.
Your organization should have strict policies in place to verify the identity of a user before a password reset can be done. One simple thing to do is to have the user go to the help desk in person. The other method, which works well if your offices are geographically far away, is to designate one contact in the office who can phone for a password reset. This way everyone who works on the help desk can recognize the voice of this person and know that he or she is who they say they are.
Why would an attacker go to your office or make a phone call to the help desk? Simple, it is usually the path of least resistance. There is no need to spend hours trying to break into an electronic system when the physical system is easier to exploit. The next time you see someone walk through the door behind you, and do not recognize them, stop and ask who they are and what they are there for. If you do this, and it happens to be someone who is not supposed to be there, most of the time he will get out as fast as possible. If the person is supposed to be there then he will most likely be able to produce the name of the person he is there to see.
I know you are saying that I am crazy, right? Well think of Kevin Mitnick. He is one of the most decorated hackers of all time. The US government thought he could whistle tones into a telephone and launch a nuclear attack. Most of his hacking was done through social engineering. Whether he did it through physical visits to offices or by making a phone call, he accomplished some of the greatest hacks to date. If you want to know more about him Google his name or read the two books he has written.
It’s beyond me why people try and dismiss these types of attacks. I guess some network engineers are just too proud of their network to admit that they could be breached so easily. Or is it the fact that people don’t feel they should be responsible for educating their employees? Most organizations don’t give their IT departments the jurisdiction to promote physical security. This is usually a problem for the building manager or facilities management. None the less, if you can educate your employees the slightest bit; you may be able to prevent a network breach from a physical or social engineering attack.
Dennis d’Entremont is the operator of SaveLoad Video Game Directory and Computers-Made-Easy.com
Author: Dennis DEntremont
Article Source: EzineArticles.com
Provided by: PCB Prototype & Manufacturing
6,668 Comments on this Post
Diyarbakır Bismil Escort
Eskort
drucker fehlercode
Alle fehlercode liste von deutschlands mit super beheben und lösung blog.
ausmalbildtv.net
Malvorlagen für Kinder und Erwachsene blog – sammlung von deutschlands.
Bahigo
Everything is very open and very clear explanation of issues. was truly information. Seo Uzmani Umut Can Skype: By_uMuT@KRaLBenim.Com
Webshop
Et professionelt logo er en vigtig del af enhver virksomheds visuelle identitet og brand.
国产线播放免费人成视频播放
Thank you for great article. Hello Administ . 儿童色情片
Slot Oyna
Thank you for content. Area rugs and online home decor store. Hello Administ . Seo Uzmani Umut Can Skype: By_uMuT@KRaLBenim.Com
Rulet Siteleri
Hi, just required you to know I he added your site to my Google bookmarks due to your layout. But seriously, I believe your internet site has 1 in the freshest theme I??ve came across.
Diyarbakır Sınırsız Escort
Eskort
Diyarbakır Çınar Escort
Eskort
dolufilm
Dolufilm film sitesi ile yüksek kalitede HD filmler izleyebilir ve paylaşabilrsiniz.
Slot Oyna
I really love to read such an excellent article. Helpful article. Hello Administ . Seo Uzmani Umut Can Skype: By_uMuT@KRaLBenim.Com
yeminli tercüme
Express Yeminli Tercüme Bürosu ile dilediğiniz yerden, 7 gün 24 saat online yeminli tercüme hizmeti alabilir, tercüme işlemlerinizi hızlı ve ekonomik bir şekilde halledebilirsiniz. Express Tercüme ile yeminli tercüme bürosu bulmak artık çok kolay! Online sipariş sayfamıza dosyanızı yükleyin, sipariş sırasında “yeminli tercüman” seçeneğini işaretleyin ve yeminli tercüme siparişinizi tek tıkla verin.
Diyarbakır Çüngüş Escort
Eskort
Diyarbakır Dicle Escort
Eskort
Bahsegel
After all, what a great site and informative posts, I will upload inbound link – bookmark this web site? Regards, Reader.
sıralı 5 li bahis nasıl hesaplanır
Bahis siteleri, kullanıcıları çekmek ve mevcut müşterilerini memnun etmek için çeşitli bonuslar sunar. Hoş geldin bonusları, yeni üyelerin kayıt olduklarında alabilecekleri avantajlı fırsatlar sunar. sıralı 5 li bahis nasıl hesaplanırYatırım bonusları, belirli bir miktar yatırım yapanları ekstra kazançlarla ödüllendirir. Kayıp bonusları ise bahislerinde kaybedenlere geri ödeme yaparak zararlarını azaltır. Sadakat programları, düzenli müşterilere özel bonuslar ve ayrıcalıklar sunar. Freebet ve freespin gibi bonuslar, kullanıcıların bahis yapmadan deneme şansı elde etmelerini sağlar. Ancak, bonusların kullanım koşulları ve çevrim şartları bulunabilir, bu nedenle kullanıcıların dikkatlice incelemeleri önemlidir.
Aybastı Perşembe Yaylası
Aybastı İnşaat Malzemesi
Ausmalbildtv
Ausmalbilder zum ausdrucken – Große Sammlung von Schwarz Weiß Bilder mit sorgfältig gestalteter Malseite.
Diyarbakır Escort
Eskort
casino
Thank you for great information. Hello Administ . Seo Uzmani Umut Can Skype: By_uMuT@KRaLBenim.Com
Diyarbakır Eğil Escort
Eskort
Aybastı
Aybastı
1xbet
Thank you for great information. Hello Administ . Seo Uzmani Umut Can Skype: By_uMuT@KRaLBenim.Com
Rulet Siteleri
I really love to read such an excellent article. Helpful article. Hello Administ .
国产线播放免费人成视频播放
Thank you great posting about essential oil. Hello Administ . 儿童色情片
Bahigo
Thank you for great content. Hello Administ. Seo Uzmani Umut Can Skype: By_uMuT@KRaLBenim.Com
wep sitesi tasarımı
Great post thank you. Hello Administ . web sitesi hizmeti
waschfehler.de
Website mit Fehlercodes und Lösungsvorschlägen für Waschmaschinen
国产线播放免费人成视频播放
Hello! I could have sworn I’ve been to this blog before but after browsing through some of the post I realized it’s new to me. 兒童色情 儿童色情片
1malvorlagen
Top coloring pages for kids and adults
Rulet Siteleri
Thank you for great content. Hello Administ.
Bahigo
Thank you great posting about essential oil. Hello Administ . Seo Uzmani Umut Can Skype: By_uMuT@KRaLBenim.Com
Diyarbakır Yenişehir Escort
Bağlar Eskort
Diyarbakır Bismil Escort
Bismil Escort
ucuz tatil
Tatillazim.com, unutulmaz bir tatil deneyimi için ihtiyaçlarınıza uygun seyahat önerileri, oteller, kamp yerleri ve eşsiz güzellikteki rotalarıyla karşınızda!
Webseo
Very nice article
Seo
Very good article
reklam hizmeti
Thank you for great article. Hello Administ . web sitesi satın al
Bahsegel
Hello! I could have sworn I’ve been to this blog before but after browsing through some of the post I realized it’s new to me.
web sitesi satın al
Thank you great posting about essential oil. Hello Administ . web ajansları
perabet giriş
perabet giriş adresi
Diyarbakır Escort Bayan
Diyarbakır Escort Bayan
paravan blog
Hello, you have a very nice website. I wanted to comment.
Sakinleştirici İlaçlar
Sakinleştirici ilaçlar hakkında tüm detaylar yazımızda
web tasarım
Good info. Lucky me I reach on your website by accident, I bookmarked it. mfajans
ikinci el bilgisayar alan yerler
hi, nice blog and wonderfull content. Thank you.
kamp yerleri
Tatillazim.com, unutulmaz bir tatil deneyimi için ihtiyaçlarınıza uygun seyahat önerileri, oteller, kamp yerleri ve eşsiz güzellikteki rotalarıyla karşınızda!
Blackjack
Thank you for great content. Hello Administ.
Nose Aesthetics
Thank your sir your blog its great. Thanks for help and sharing.