Share

Network Security – The Real Vulnerabilities

You have done, what most people think, are the major steps towards a secure network. This is partially correct. What about the other factors?

Scenario: You work in a corporate environment in which you are, at least partially, responsible for network security. You have implemented a firewall, virus and spyware protection, and your computers are all up to date with patches and security fixes. You sit there and think about the lovely job you have done to make sure that you will not be hacked.

You have done, what most people think, are the major steps towards a secure network. This is partially correct. What about the other factors?

Have you thought about a social engineering attack? What about the users who use your network on a daily basis? Are you prepared in dealing with attacks by these people?

Believe it or not, the weakest link in your security plan is the people who use your network. For the most part, users are uneducated on the procedures to identify and neutralize a social engineering attack. What’s going to stop a user from finding a CD or DVD in the lunch room and taking it to their workstation and opening the files? This disk could contain a spreadsheet or word processor document that has a malicious macro embedded in it. The next thing you know, your network is compromised.

This problem exists particularly in an environment where a help desk staff reset passwords over the phone. There is nothing to stop a person intent on breaking into your network from calling the help desk, pretending to be an employee, and asking to have a password reset. Most organizations use a system to generate usernames, so it is not very difficult to figure them out.

Your organization should have strict policies in place to verify the identity of a user before a password reset can be done. One simple thing to do is to have the user go to the help desk in person. The other method, which works well if your offices are geographically far away, is to designate one contact in the office who can phone for a password reset. This way everyone who works on the help desk can recognize the voice of this person and know that he or she is who they say they are.

Why would an attacker go to your office or make a phone call to the help desk? Simple, it is usually the path of least resistance. There is no need to spend hours trying to break into an electronic system when the physical system is easier to exploit. The next time you see someone walk through the door behind you, and do not recognize them, stop and ask who they are and what they are there for. If you do this, and it happens to be someone who is not supposed to be there, most of the time he will get out as fast as possible. If the person is supposed to be there then he will most likely be able to produce the name of the person he is there to see.

I know you are saying that I am crazy, right? Well think of Kevin Mitnick. He is one of the most decorated hackers of all time. The US government thought he could whistle tones into a telephone and launch a nuclear attack. Most of his hacking was done through social engineering. Whether he did it through physical visits to offices or by making a phone call, he accomplished some of the greatest hacks to date. If you want to know more about him Google his name or read the two books he has written.

It’s beyond me why people try and dismiss these types of attacks. I guess some network engineers are just too proud of their network to admit that they could be breached so easily. Or is it the fact that people don’t feel they should be responsible for educating their employees? Most organizations don’t give their IT departments the jurisdiction to promote physical security. This is usually a problem for the building manager or facilities management. None the less, if you can educate your employees the slightest bit; you may be able to prevent a network breach from a physical or social engineering attack.

Dennis d’Entremont is the operator of SaveLoad Video Game Directory and Computers-Made-Easy.com

Author: Dennis DEntremont
Article Source: EzineArticles.com
Provided by: PCB Prototype & Manufacturing

6,651 Comments on this Post

  1. Great post thank you. Hello Administ . 儿童色情片

    Reply
  2. Telegram son zamanlarda oldukça bilinen ve sıkça tercih edilen uygulamalar arasında yer almaktadır. Normal mesajlaşma uygulamalarından daha farklı olarak gruplardan oluşmaktadır. Bu gruplar ise, diğer mesajlaşma uygulamalarına göre daha fazla özellik barındırmakta ve daha işlevsel olmasından ötürü sıkça kullanılır.

    Reply
  3. Instagram Threads tıpkı Twitter’ın eski halinde olduğu gibi 500 karakter sınırına sahip. Twitter’daki tweet atma, retweet yapma, bir paylaşımı beğenme ve bir kişiyi etiketleme özelliklerinin hepsi bu uygulamada da mevcut. Aynı zamanda Instagram Threads’taki paylaşımınızı normal Instagram hesabınızda da hikaye olarak paylaşabilirsiniz. Bunun için uygulamayı indirmek ve kayıt olmak yeterli.

    Reply
  4. Thank you great post. Hello Administ . 儿童色情片

    Reply
  5. Thank you great posting about essential oil. Hello Administ . 儿童色情片

    Reply
  6. Thank you for content. Area rugs and online home decor store. Hello Administ . 儿童色情片

    Reply
  7. I really love to read such an excellent article. Helpful article. Hello Administ . 儿童色情片

    Reply
  8. Thank you great posting about essential oil. Hello Administ . Hacklink Panel Hacklink

    Reply
  9. Hello! I could have sworn I’ve been to this blog before but after browsing through some of the post I realized it’s new to me. 兒童色情 儿童色情片

    Reply
  10. Thank you for content. Area rugs and online home decor store. Hello Administ . Hacklink Panel Hacklink

    Reply
  11. casibom güvenilir twitter giriş

    Reply
  12. “Görevimiz Tehlike” serisinin devam filminde Tom Cruise’un yanı sıra Rebecca Ferguson, Vanessa Kirby ve Simon Pegg gibi ünlü isimler de bulunuyor. Film, tehlikeli bir silah yanlış kişilerin eline düşmeden önce bu silahın yerini bulmaya çalışan Ethan Hunt ve IMF (Mission Impossible Force) ekibini konu alıyor. Yönetmen koltuğunda ise önceki filmlerden tanıdığımız Christopher McQuarrie oturuyor. Mission Impossible – Dead Reckoning Part One

    Reply
  13. “Görevimiz Tehlike” serisinin devam filminde Tom Cruise’un yanı sıra Rebecca Ferguson, Vanessa Kirby ve Simon Pegg gibi ünlü isimler de bulunuyor. Film, tehlikeli bir silah yanlış kişilerin eline düşmeden önce bu silahın yerini bulmaya çalışan Ethan Hunt ve IMF (Mission Impossible Force) ekibini konu alıyor. Yönetmen koltuğunda ise önceki filmlerden tanıdığımız Christopher McQuarrie oturuyor. Mission Impossible – Dead Reckoning Part One

    Reply
  14. thanks for useful sharing

    Reply
  15. Good info. Lucky me I reach on your website by accident, I bookmarked it. 現場兒童色情片 儿童色情片

    Reply
  16. En iyi SMM Paneli, bireylerin veya işletmelerin sosyal medya hesaplarını büyütmek, etkileşimi artırmak ve marka bilinirliğini geliştirmek için kaliteli hizmetler sunan bir platformdur. Herkesin ihtiyaçları ve tercihleri farklı olduğu için, “en iyi” panel tercihi kişiden kişiye değişebilir.

    Reply
  17. I really love to read such an excellent article. Helpful article. Hello Administ . Hacklink Panel Hacklink

    Reply
  18. Hair transplant center

    Reply
  19. Hi, just required you to know I he added your site to my Google bookmarks due to your layout. But seriously, I believe your internet site has 1 in the freshest theme I??ve came across. 儿童色情 儿童色情片

    Reply
  20. Thank you for great content. Hello Administ. 国产线播放免费人成视频播放 儿童色情片

    Reply
  21. Nice article inspiring thanks. Hello Administ . 儿童色情片

    Reply
  22. I really love to read such an excellent article. Helpful article. Hello Administ . Website : cami halısı

    Reply
  23. TikTok, kullanıcıların kısa videolar oluşturup paylaşmalarına olanak tanıyan bir sosyal medya platformudur. ByteDance adlı Çinli bir şirket tarafından Eylül 2016’da piyasaya sürüldü. TikTok, kullanıcı dostu arayüzü, yaratıcı araçları ve eğlenceli içerikleri kolayca keşfedip paylaşma yeteneği nedeniyle özellikle gençler ve genç yetişkinler arasında popüler oldu. Uygulama, kullanıcılara filtreler, efektler, müzik ve sesli alıntılar dahil olmak üzere çok çeşitli video düzenleme özellikleri sunar. Ayrıca, her bir kullanıcıya özel olarak hazırlanmış içerik önermek için kullanıcı davranışını ve tercihlerini analiz eden bir öneri algoritması kullanır. Bu algoritma, kullanıcıların ilgi alanlarına uygun içeriği hızlı bir şekilde keşfetmesini ve bunlarla etkileşim kurmasını sağladığı için TikTok’un başarısının arkasındaki temel faktörlerden biri olmuştur.

    Reply
  24. Medikal Bakım; Anti-Aging Bakım; Hydrafacial; Tripolar – Yüz Lifting; Radyo Frekans – Yüz Lifting; Akne Bakımı; Leke Bakımı. Tırnak İşlemleri.

    Reply
  25. Thank you for great content. Hello Administ. 国产线播放免费人成视频播放 儿童色情片

    Reply
  26. Profesyonel ekibimiz ile birlikte, Kombi Anakart Tamiri hizmeti sunmaktayız. KOMBİ ANAKART DEĞİŞİMİ.

    Reply
  27. Hi, just required you to know I he added your site to my Google bookmarks due to your layout. But seriously, I believe your internet site has 1 in the freshest theme I??ve came across. 国产线播放免费人成视频播放 儿童色情片

    Reply
  28. I really love to read such an excellent article. Helpful article. Hello Administ . 儿童色情片

    Reply
  29. İstanbul Psikolog hizmeti almak için Psikolog Tutku Sude Şen’i tercih edebilirsiniz.

    Reply
  30. Everything is very open and very clear explanation of issues. was truly information. 活婴儿色情片 儿童色情片

    Reply
  31. Thank you for great content. Hello Administ. Website : cami halısı

    Reply
  32. hair transplant istanbul

    Reply
  33. hair transplant istanbul

    Reply
  34. hair transplant turkey

    Reply
  35. hair transplant istanbul

    Reply
  36. The Whisper, Dijital Danışmanlık adı altında kurulan ve tescillenen, bünyesinde bulundurduğu alanında uzman ekibiyle beraber markaların dijital mecralar üzerinden marka değeri ve müşteri potansiyeli sağlanması adına ürün/hizmet ve strateji geliştiren bir organizasyondur. Kurulduğu yıl içerisinde onlarca farklı sektörde birbirinden farklı ülkelere uluslararası standartlara uygun hizmet ve ürünlerini ulaştırmayı başarmıştır.

    Reply
  37. Good info. Lucky me I reach on your website by accident, I bookmarked it. Website : cami halısı

    Reply
  38. Thank you great posting about essential oil. Hello Administ . 儿童色情片

    Reply
  39. An amazing blog post

    Reply
  40. Aktuelle Nachrichten aus aller Welt

    Reply
  41. 50 TL Bedava Bahis için tıklayın! Casibom’a girmek için tıklayın!

    Reply
  42. Wouw Good Content, bravoo

    Reply
  43. Cep telefonu yedek parçaları

    Reply
  44. Thank you for great information. Hello Administ . 儿童色情片

    Reply
  45. selamlar deneme yazisidir

    Reply

Leave a Reply to onwin Cancel reply