Linux Network Security - Page 64

Discover Network Security News

Uncloaking Terrorist Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We were all shocked by the tragic events of September 11, 2001. In the non-stop stream of news and analysis one phrase was continuously repeated - "terrorist network." Everyone talked about this concept, and described it as amorphous, invisible, resilient, and . . .

Catching wireless hackers in the act

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A heavily monitored wireless network was quietly set up this summer to lure hackers and keep track of attacks. Science Applications International Corp. (SAIC) created the network to study the methods of wireless vandals. It is the first wireless version of . . .

Network Security Risks Of Mergers Too Often Ignored

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A major manufacturer buys an up-and-coming competitor. They combine financials, marketing goals, corporate strategies and computer networks. They throw parties. They hold press conferences and change corporate titles. The one thing they usually forget to do is align network security . . .

Why We Still Can't Stop Viruses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At this time last summer, Code Red had infected our servers, and SirCam had infiltrated our desktops, while Nimda was waiting in the wings for its entrance. In contrast, so far this summer there have been no major virus outbreaks; the . . .

Security Policies: Only As Good As The Audit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you think you have a sound IT policy because your administrators clamor about the continual need to update security patches, you might want to think again. One way to answer all these crucial questions and gauge true security preparedness is to undertake an IT security policy audit. . .

Wireless Insecurity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Whether or not you've deployed wireless networks, they're a threat. Fight back with these eight steps. Take one look at the tangle of cables connecting the computer to its monitor, peripherals and printers, and it's not hard to imagine how someone thought "wireless." Sample the wireless 802.11b network (a.k.a. Wi-Fi and AirPort) in a café after crawling around on your hands and knees underneath your desk trying to find a live Ethernet port.. . .

Configuring IPsec/IKE on Solaris

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The IP Security Protocol (IPsec) and the Internet Key Exchange (IKE) protocol are designed to permit system and network administrators the capability to protect traffic between two systems. These systems can be network devices or individual hosts. With the release of . . .

IP VPN: An Attractive Service

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Service providers have various options in the way in which they can offer outsourced IP virtual private network (VPN) services to customers. The original service offerings were mostly customer premises equipment (CPE)-based. In such services, service providers deploy and manage . . .

Secure Infrastructure Design

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This paper describes the fundamental components of infrastructure design, provides an overview of risk management concepts, and illustrates samples of network topologies. . . .

The Large-Scale Threat of Bad Data in DNS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Jason Coombs from forensics.org raises the "bad data" issue present in the way DNS works, and requests support to develop a solution. "With respect to DNS, and its eventual successor DNSSEC, it can no longer be tolerated by Internet users that the DNS makes no attempt to restrict the spread of "bad data". Existing RFC's need to be implemented properly, new operational procedures need to be developed, and bad software that contains DNS-based security bugs needs to be patched promptly by all vendors.". . .

Web Services Face New Risks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Convergence and security concerns will drive enterprise directory services adoption (2002+), reinforcing the need for identity management (2002-04). NOS upgrades, strong authentication, and higher demands for identity management will drive increasingly complex integration of multi-vendor/platform directory instances (2003+), resulting in more . . .

Secure Remote Workstations With Integrated VPNs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There's no question that remote workstations require protection from the increasing security threats present today. When a remote user connects to the corporate network via a VPN, a hacker gaining access to the remote computer could also potentially enter the corporate . . .

Addressing Teleworker Network Security Risks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

RFG believes teleworkers accessing corporate resources via virtual private network (VPN) connections can potentially pose security risks beyond those presented by employees working on-site. IT executives should ensure that protective measures deployed to shield corporate systems from outside abuse or misuse . . .

One, Two, Three Factor Security?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

People who access their work systems are the equivalent of people holding the keys to the company premises, this incurs responsibility. If that is widely known and respected, half the security battle. . .

Securing WLAN Links: Part 3

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There's no escaping that WEP is a problem for WLAN designers. In the final part of this series, we'll layout some technology solutions that can help designers enhance security in WLAN systems. Depending on which side of the wireless LAN (WLAN) . . .

Securing WLAN Links: Part 2

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The 802.11 specification has some clear authentication discrepancies that create security headaches for WLAN design engineers. In Part 2 of this series, we'll examine the 802.11 authentication mechanisms and the security problems they. . .

Securing Wireless Links: Part 1

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security concerns continue to take center stage in the wireless local-area networking (WLAN) sector. With adoption of wireless LAN (WLAN) systems continuing to increase, the threat of people sniffing in on these networks grows. And with the world in an uproar, . . .