Friday, September 02, 2005

Ten-Minute Guide To Network Security

Ten-Minute Guide To Network Security

The Internet can be a dangerous place, full of viruses, worms and hackers bent on doing harm to your network. "Security first" has become a kind of mantra for IT professionals and CIOs, while regulations like Sarbanes-Oxley have made network protection as much a question of legal responsibility as good business sense.

But between upgrading the local area network (LAN) to Gigabit Ethernet, deploying voice over IP (VoIP), putting out network fires and making sure everything runs smoothly, many IT managers are already stretched to the limit. Security can be a complex, expensive and time-consuming business.

Nevertheless, every great journey begins with a single step, and even if you only have ten minutes to devote to the project, you can still use that time to get the security ball rolling. "I think the key is not to think about securing your network in ten minutes," says Jason Hilling, Director of Managed Security Services Product Management at Internet Security Systems, "but to get the whole process started in those ten minutes."

So if you've got free ten minutes, here's what to do --- follow our ten-minute guide to network security.

Evaluate your security policy: Every organization needs some kind of security policy, but it is often surprising how many do not. The problem, of course, is that network security is often perceived as a technological problem that you can throw money and gadgets at to make better. If things were that simple, then worms and hackers would be a thing of the past.

"Every organization needs a policy to ensure that processes and procedures are in place to ensure security," Hilling says. "What are the acceptable use criteria? How are your systems built and have to ensured that there are no extraneous devices in the network or applications on networked devices? What are the acceptable communications applications? These are all things that you can deal with."

Hilling concedes that it takes time to develop a security policy and that no one can get the job done in ten minutes over coffee. But like all processes, this one can get underway quickly, with the decision to start and the selection of a manager who'll be responsible to plan and implement the policy.

Vulnerability Management: "One of the most important things you can do when you have limited time is to find out where you are vulnerable," Hilling says. "To a certain extent, everything follows from this."

As with the creation of a security policy, an audit of an organization's vulnerabilities can be a very daunting and complex process. "But the process has to be done," Hilling says. "Most security problems aren't related to the wily, determined hacker who uses his cunning to get into your network, they're more likely related to worms and denial of service (DoS) attacks."

Worms and DoS attacks exploit known network vulnerabilities. Consequently, the best way to defend against them is to find the flaws before the attackers do. It will take time to sift through every switch, router and server on your network, of course, but Hilling is quick to point out that it takes virtually no time at all to start the process and delegate someone to see it through.
Patch management: "Once you have the process in place to identify vulnerabilities, you then have to ask how you are going to patch them," Hilling says. "Patching can be the most important thing you can do."

As with everything else, this can be an involved process, but Hilling points out that it takes second to decide to implement a patching strategy and another minute to delegate someone to oversee it. "Patching is something that organizations can easily fall behind on," Hilling says. "Someone has to be responsible to see that that doesn't happen."

Get informed: The best way to stay on top of security vulnerabilities, of course, is to make sure you know about them before they bit you in the tender parts. That means taking the time to scan the latest warnings and maybe even reading your favorite networking or security websites over coffee. It doesn't take long to stay informed once you are informed but, as with everything else, you have to take the time to start the process.

"There are a lot of solutions that can bring security intelligence to you," Hilling says. "If you don't have the time to address security yourself, any good managed service provider will deliver intelligence to its customers about what's out there."

Go shopping: Even if security is not strictly a technology issue, you need technology to secure your network. It's probably not a good idea to drop $10,000 on intrusion prevention systems and firewalls in ten minutes -- and the board of directors would have your head if you did -- but it only takes a few minutes to see what what's out there.

Think of it as security window shopping, but take the time to think about what you need and how you will deploy it. "You need to look at security technologies from three levels," Hilling says. "First, what do I need to do to protect the network as a whole, secondly, what do I need to protect my servers. Finally, how will security impact my end users."

sumber: http://www.linuxsecurity.net

6 comments:

d2nr said...

security oh security, selalu saja menjadi topik yang menarik untuk dipergunjingkan.

fanani said...

lupa nih, "Ten-Minute Guide To Network Security" and "one minute to forgot it"
:D

Joe Muka said...

Just surfing around late night and came upon your blog...I liked it.
My site about voip is hard to have a blog for VOIP stuff and boring too

Anonymous said...

Hey... Interesting post on asterisk comcast configuration pbx voip. By the way... Just found this resource where you can post your own articles on asterisk comcast configuration pbx voip - if you have something you want to share with the world. Besides, at the same time you'll get a link back to your own site on anything concerning asterisk comcast configuration pbx voip - or whatever else you'd like... why don't you check it out for yourself now...

PolarTrader said...

Hi!

I really enjoy your blog aimed at VoiP Solution.
This VoiP Soulution is based on P2P and I'am very impressed of all the options. It must be some of the best Voip Solutions Architecture on the net.
As an Affiliate you get a very lucrative income potentials, Total company payout: 90%
f ip solution voip
and
f ip solution voip

Regards

Trond K.

WorldTrader said...

Hi!

I really enjoy your blog aimed at VoiP Solution.
This VoiP Soulution is based on P2P and I'am very impressed of all the options. It must be some of the best Voip Solutions Architecture on the net.
As an Affiliate you get a very lucrative income potentials, Total company payout: 90%
solution turnkey voip
and
solution turnkey voip

Regards

Trond K.