Linux Network Security - Page 62

Discover Network Security News

Homeland Security's tech effects

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The overwhelming vote by the Senate late Tuesday approving a Homeland Security Department clears the way for massive reorganization of the federal government that will have a dramatic impact on computer and network security. . .

New Consortium Links IT and Physical Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network security managers in some organizations are starting to work more closely with their counterparts from the world of "physical" security. Since 9/11, for example, the State of New York has launched a "cyber security initiative" involving security specialists of both kinds, as well as other IT employees. Many government officials are now advocating this sort of "collaborative security" as a strategy for private businesses. . .

Use WPA to Improve Wireless LAN Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wi-Fi Protected Access (WPA) will replace Wired Equivalent Privacy (WEP), which presents security concerns on wireless LANs. Enterprises should install WPA as soon as it becomes available, likely in first quarter 2003. . .

New flaws expose Net to attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A security firm finds three new flaws in the software on which the Internet's domain name system relies, which means new attacks could be around the corner. All three flaws could lead to denial-of-service attacks on the majority of domain name system (DNS) servers, which act as the address books for the Internet, said Internet Security Systems, which discovered the vulnerabilities. . .

Plan for a security architecture

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Volatility and immaturity in security technology will continue to make enterprisewide technology architectures impractical through 2003. However, the need for a consistent approach, scalability, agility, and auditability will drive development of adaptive, top-down security architectures encompassing consistent policy frameworks, strong process . . .

Antenna to boost wireless security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An optical antenna that uses a geometrically shaped lens promises to bring greater security to wireless networks for businesses, according to British scientists. The new device, developed by researchers at the University of Warwick's engineering department, uses a combination of . . .

How to Keep The Wireless Snoops Away

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A wireless network is like hundreds of network cables floating in search of a rogue computer. A good attacker can get into most networks by taking advantage of a wireless connection and its Wired Equivalent Privacy security. . .

Network Signals Just Scream to Be Exploited

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I recently strolled past federal buildings along Connecticut Avenue in Washington, carrying a beta-test model of a tablet PC equipped with an integrated IEEE 802.11b wireless PC Card. In no time, it auto-detected a wireless network. The tablet asked me if I wanted to connect. I declined, but as I kept walking, the tablet detected signals for three more wireless networks. . .

Wireless WarDrive: Wee Bit of Fun

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most WarDrivers use a laptop loaded with network-sensing applications like NetStumbler, plugged into a small, omni-directional antenna. "On my first drive, I had a single directional antenna, a cheap old Lucent wireless card and a Windows laptop running NetStumbler," c0nv3r9 . . .

Sniffer Library Version 1.0

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Chris Bennetts writes, "This Sniffer package allows a high level programmer to sniff IP packets arriving at, and leaving their computer. A queue of IP packets is sent to the Java or C++ program and the programmer can analyse each packet in sequence. The programmer can optionally filter the queue of IP packets by specifying the IP addresses, protocols and port numbers for which packets are queued.. . .

Wireless LAN security: Time to take action

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The problem has been exacerbated by the advent or wireless technology and the implementation of WLANs which have not benefited from the corporate "fortress mentality" that is evident in terms of physical security. The reason for this may be simple ignorance . . .

Smart Security: Network Scanners

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Don't wait for a hacker to show you where your network's vulnerabilities lie. Be smart, and use a network scanner with intelligence--artificial intelligence (AI), to be precise. . .

Building A Better Virus Defense

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Antivirus on the desktop is fairly mature. However, the IT organization must now coordinate a layered defense to prevent viruses from penetrating the core network, particularly via e-mail. In addition, the IT organization must develop a comprehensive configuration, monitoring, and event . . .

Don't Let Digital Hobos Camp on Your Wireless Network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The trend is called war chalking. (It derives its name from the now-ancient practice of war dialing, in which hackers would set their modems to dial every telephone number in town, in search of other modem-connected computers.) Nowadays, some ingenious mobile . . .

Wireless risk exaggerated

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Of all the emotive topics IT generates, security seems to be the one most frequently and irrationally debated. As a general rule people's attention to security is inversely related to the actual risk, value, or need. Companies pour resources into making . . .

Lack Of Training Your Biggest Threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Contrary to popular belief, corporate sabotage is among the least likely causes of computer security breaches. According to an April 2002 survey by the Computer Security Institute, sabotage accounted for just 8 percent of system attacks in 2002. Security breaches . . .

A Security Nightmare: Wireless Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

And after suffering through the Love Bugs and Code Reds of e-mail, the growth of mobile wireless raises the question of whether businesses have learned their lessons for this second round. So far, experts say, not really. But the final test may still be a few years away.. . .