Share

Network Security – The Real Vulnerabilities

You have done, what most people think, are the major steps towards a secure network. This is partially correct. What about the other factors?

Scenario: You work in a corporate environment in which you are, at least partially, responsible for network security. You have implemented a firewall, virus and spyware protection, and your computers are all up to date with patches and security fixes. You sit there and think about the lovely job you have done to make sure that you will not be hacked.

You have done, what most people think, are the major steps towards a secure network. This is partially correct. What about the other factors?

Have you thought about a social engineering attack? What about the users who use your network on a daily basis? Are you prepared in dealing with attacks by these people?

Believe it or not, the weakest link in your security plan is the people who use your network. For the most part, users are uneducated on the procedures to identify and neutralize a social engineering attack. What’s going to stop a user from finding a CD or DVD in the lunch room and taking it to their workstation and opening the files? This disk could contain a spreadsheet or word processor document that has a malicious macro embedded in it. The next thing you know, your network is compromised.

This problem exists particularly in an environment where a help desk staff reset passwords over the phone. There is nothing to stop a person intent on breaking into your network from calling the help desk, pretending to be an employee, and asking to have a password reset. Most organizations use a system to generate usernames, so it is not very difficult to figure them out.

Your organization should have strict policies in place to verify the identity of a user before a password reset can be done. One simple thing to do is to have the user go to the help desk in person. The other method, which works well if your offices are geographically far away, is to designate one contact in the office who can phone for a password reset. This way everyone who works on the help desk can recognize the voice of this person and know that he or she is who they say they are.

Why would an attacker go to your office or make a phone call to the help desk? Simple, it is usually the path of least resistance. There is no need to spend hours trying to break into an electronic system when the physical system is easier to exploit. The next time you see someone walk through the door behind you, and do not recognize them, stop and ask who they are and what they are there for. If you do this, and it happens to be someone who is not supposed to be there, most of the time he will get out as fast as possible. If the person is supposed to be there then he will most likely be able to produce the name of the person he is there to see.

I know you are saying that I am crazy, right? Well think of Kevin Mitnick. He is one of the most decorated hackers of all time. The US government thought he could whistle tones into a telephone and launch a nuclear attack. Most of his hacking was done through social engineering. Whether he did it through physical visits to offices or by making a phone call, he accomplished some of the greatest hacks to date. If you want to know more about him Google his name or read the two books he has written.

It’s beyond me why people try and dismiss these types of attacks. I guess some network engineers are just too proud of their network to admit that they could be breached so easily. Or is it the fact that people don’t feel they should be responsible for educating their employees? Most organizations don’t give their IT departments the jurisdiction to promote physical security. This is usually a problem for the building manager or facilities management. None the less, if you can educate your employees the slightest bit; you may be able to prevent a network breach from a physical or social engineering attack.

Dennis d’Entremont is the operator of SaveLoad Video Game Directory and Computers-Made-Easy.com

Author: Dennis DEntremont
Article Source: EzineArticles.com
Provided by: PCB Prototype & Manufacturing

6,651 Comments on this Post

  1. Nice article inspiring thanks. Hello Administ . hdxvipizle

    Reply
  2. Hi, just required you to know I he added your site to my Google bookmarks due to your layout. But seriously, I believe your internet site has 1 in the freshest theme I??ve came across. deneme bonusu

    Reply
  3. Wouw, amazing!

    Reply
  4. Great post thank you. Hello Administ . Casibom Resmi Adresimiz için Tıklayin. ! casibom

    Reply
  5. Nice post admin, keep it!

    Reply
  6. Good info. Lucky me I reach on your website by accident, I bookmarked it. Casibom Resmi Adresimiz için Tıklayin. ! Deneme Bonusu Veren Siteler

    Reply
  7. Thank you for great article. Hello Administ . Casibom Resmi Adresimiz için Tıklayin. ! casibom

    Reply
  8. Thank you admin!

    Reply
  9. Everything is very open and very clear explanation of issues. was truly information. deneme bonusu

    Reply
  10. heets satın almak için sitemizi ziyaret edebilirsiniz.

    Reply
  11. Thx admin, amazing post.

    Reply
  12. Thank you for great article. Hello Administ . valorant cheat buy

    Reply
  13. Thank you for great information. Hello Administ . hacklink panel

    Reply
  14. Good info. Lucky me I reach on your website by accident, I bookmarked it. Casibom Resmi Adresimiz için Tıklayin. ! casibom

    Reply
  15. thanks for the content

    Reply
  16. Thank you for content. Area rugs and online home decor store. Hello Administ . valorant cheat buy

    Reply
  17. Great post thank you. Hello Administ . hacklink panel

    Reply
  18. Hi, your content is really great. We will be waiting for more.

    Reply
  19. Thank you for content. Area rugs and online home decor store. Hello Administ . hacklink panel

    Reply
  20. Really good, thx.

    Reply
  21. Nice post admin, keep it!

    Reply
  22. Thx admin, amazing post.

    Reply
  23. I was truly impressed by your article! The depth of research you conducted was evident, and it added credibility to your arguments. Your writing style was engaging, and I appreciated the way you presented complex ideas in a simple and understandable manner. It was a pleasure to read!

    Reply
  24. I must say, your article was absolutely fantastic! It captured my attention from the very beginning and held it until the end. The way you articulated your ideas was clear and concise, making it easy for me to grasp the concepts. Thank you for sharing your knowledge and expertise!

    Reply
  25. Hi, your content is really great. We will be waiting for more.

    Reply
  26. Shoutout til Adify.dk for deres oplysninger om digital markedsføring. Deres ekspertise og indsigt imponerer, og jeg anbefaler alle at tjekke deres hjemmeside for at forbedre online tilstedeværelse.

    Reply
  27. Thank you great post. Hello Administ . Casibom Resmi Adresimiz için Tıklayin. ! casibom

    Reply
  28. Thank you for great information. Hello Administ . Casibom Resmi Adresimiz için Tıklayin. ! casibom

    Reply
  29. şimdi ananın yanına

    Reply
  30. İşaret Dili Temel Eğitimi<a href “https://myeduco.com/egitim/isaret-dili-temel-egitimi/” İşaret Dili Temel Eğitimi <| MyEduco İŞARET DİLİ EĞİTİMİ 1) İŞARET DİLİ TEMEL EĞİTİMİ İşaret Dili Nedir? İşaret dili eğitimi, işitme engelli vatandaşların aralarında iletişim kurmaları için, el hareketlerini, jest ve mimiklerini kullandıkları görsel bir iletişim dilidir. İşaret Dili Eğitimi’ne Kimler Katilabilir? İşaret Dili Temel Egitimi’ni, isaret dilini ögrenmek ve kariyer anlaminda kendini gelistirmek isteyen herkes alabilir. <a href “https://myeduco.com/egitim/isaret-dili-temel-egitimi/” İşaret Dili Temel Eğitimi <| MyEduco

    Reply
  31. harika ya! bayıldım

    Reply
  32. İşaret Dili Temel Eğitimi<a href “https://myeduco.com/egitim/isaret-dili-temel-egitimi/” İşaret Dili Temel Eğitimi <| MyEduco İŞARET DİLİ EĞİTİMİ 1) İŞARET DİLİ TEMEL EĞİTİMİ İşaret Dili Nedir? İşaret dili eğitimi, işitme engelli vatandaşların aralarında iletişim kurmaları için, el hareketlerini, jest ve mimiklerini kullandıkları görsel bir iletişim dilidir. İşaret Dili Eğitimi’ne Kimler Katilabilir? İşaret Dili Temel Egitimi’ni, isaret dilini ögrenmek ve kariyer anlaminda kendini gelistirmek isteyen herkes alabilir. <a href “https://myeduco.com/egitim/isaret-dili-temel-egitimi/” İşaret Dili Temel Eğitimi <| MyEduco

    Reply
  33. very good nice blog thanks you

    Reply

Leave a Reply