Linux Network Security - Page 54

Discover Network Security News

SSL VPN Gateways: A New Approach to Secure Remote Access

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security is the cornerstone of any remote-access implementation; it is axiomatic that good security is easily managed security. SSL VPN appliances can quickly integrate into the network, providing companies with a rapid-deployment solution without modifications or interruptions to existing application servers . . .

Wireless security a daunting challenge

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Business owners don't walk away from their buildings at night and leave the doors wide open. But quite a few are doing something that could become nearly as dangerous: Leaving wireless networks wide open to anyone passing by with a portable . . .

'DDoS' Attacks Still Pose Threat to Internet

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

t has been little more than a year since a massive data attack struck the underpinnings of the Internet, and security experts say a more coordinated attempt could do even worse damage. On October 21, 2002, people around the world cruised . . .

8 Steps To Protect Your Cisco Router

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this article i will give you 8 steps, easy to follow, to minimize your Cisco router exposure, by turning off some unused services, applying some access control. Network Security is a completely changing area; new devices like IDS (Intrustion . . .

Network security sector analysis

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With viruses and worms popping up in the news more and more often - like the infamous Blaster worm that infested computer networks in August -security incidents seem to be increasing at an epidemic rate. According to a study by the . . .

Monitoring Network Integrity with Nmap

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The value of a computer's information determines its desirability as a target for hacking -- but only in part. Even valueless machines can serve as jumping-off sites for additional attacks once compromised, or be used to gather information about an ostensibly . . .

VPN Capabilties

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Edge-router VPN (virtual private network) capabilities are the next step in functionality from point-to-point multiservice networking. This is a big - and potentially confusing - subject because there are different types of VPNs, and these can be implemented in different ways . . .

Standardizing Authentication Using the Security Assertion Markup Language (SAML)

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Your identity-management system doesn't have to dictate your corporate security strategy anymore. SAML (Security Assertion Markup Language) provides a standard way to exchange authentication and authorization information between different vendors' other applications so you can switch from LDAP to RADIUS authentication, for instance, without recoding your applications.. . .

Network documentation must include a security operations guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Put simply, a security operations guide is a document that clearly defines your network's security-related policies and procedures. Over the years, I've done security-related consulting for a number of organizations. In these real-world environments, I've always found that the organizations that . . .

Enterprise security still problematic

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Experts have re-emphasised the need for companies to improve their IT security infrastructures, at a recent forum in Norway. At the OECD's Global Forum on Information Systems and Network Security, Jeremy Ward, director of services development for Symantec, said that many . . .

'Net security gets root-level boost

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A year after surviving a massive distributed denial-of-service attack, the Internet's root servers are better fortified against hacker activity, thanks to behind-the-scenes deployment of a routing technique known as Anycast, experts say.. . .

Taking Back Control of Your Network Bandwidth

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You can't manage what you can't see. So it's not surprising that with corporate networks congested more and more by P2P, streaming media, and other "leisure" traffic, network admins are increasingly turning to specialized network management software packages and appliances to . . .

Hackers steal easily guessed passwords

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hackers are increasingly resorting to social engineering techniques to obtain confidential passwords, as businesses become better at locking down and patching their computer networks. And the bad news is that users are still very much the weak link when it comes . . .

SSL-VPNs sizzle

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

According to Johna Johnson, president and chief research officer at Nemertes Research, SSL defines a secure, encrypted communications mechanism between applications, most commonly between a web browser and server, and is independent of the underlying protocols, particularly IP (see also page . . .

Retail wireless security: a few considerations

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Retailers worldwide are making the move to wireless computing, both for the flexibility it brings to in-store operations and the speed it adds to business processes. Mobile platforms and wireless networks allow retailers to complete transactions and authorizations while collecting data . . .

Protocol analyzers restore network health

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Every IT department with mission-critical computer operations tries to implement security measures to protect its network from data loss, performance degradation or other damage, but such damage inevitably occurs in even the best-defended environments. Most network performance and security products report . . .

LEAP attack tool author says he wants to alert users to risks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Joshua Wright, the systems engineer who created a tool that targets wireless LANs protected by Cisco Systems Inc.'s Lightweight Extensible Authentication Protocol (LEAP), said he did so to demonstrate the ease with which dictionary attacks against the protocol can crack user passwords.. . .

Attackers seek weaknesses inside the firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The security firm says cyber-attackers are refocusing their efforts on PCs inside the perimeter of corporate networks Corporations should be as concerned about personal computers inside the network perimeter as those riding its boundary, warns Symantec's security team. Vincent Weafer, senior . . .

Hacking the Call Center

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Every corporate IT department faces its share of security threats from the outside world. But contact centers face double the danger, since potential data thieves likely lurk in their own ranks as well. . .