Networking: A Beginner’s Guide Fifth Edition- P33 pot

5 227 0
Networking: A Beginner’s Guide Fifth Edition- P33 pot

Đang tải... (xem toàn văn)

Thông tin tài liệu

142 Networking: A Beginner’s Guide M ost networking tasks are relatively straightforward. Do you want a new file and print server? You install it and set it up, and it either works or it doesn’t. If it doesn’t work, you proceed to troubleshoot it, fix any issues, and ultimately complete the task. Network security, on the other hand, is a horse of a different color. You can never really finish the project of securing a network, and you can never be certain that a network is completely secure. How much money you invest in securing a network, how much time you devote to the job, and how much fancy security hardware and software you install doesn’t matter—no network is ever completely secure. Having said that, network security is one of the most important jobs facing any network administrator. Good network security helps prevent the following: N Company secrets, such as proprietary designs or processes, falling into the wrong hands (both internally and externally) N Personal information about employees falling into the wrong hands N Loss of important information and software N Loss of use of the network itself or any part of the network N Corruption or inappropriate modification of important data These are just some of the more important losses that network security can prevent. If you spend any time thinking about all the information that is stored on and that flows through networks with which you work (and you should spend time thinking about this), you’ll probably come up with additional dangers to avoid. This chapter provides an overview of the subject of network security. Its aim is to familiarize you with important network security ideas and concepts, as well as various technologies involved in network security. If you are responsible for a network’s security, you should pursue more detailed information, and you should also seriously consider hiring a specialist on this subject to help you secure your network. Even if you don’t have primary responsibility to keep your network secure, the security of the network is everyone’s job. If you’re an IT professional, security is an even more important part of your job. Understanding Internal Security Internal security is the process of securing your network from internal threats, which are generally much more common than external threats. Examples of internal threats include the following: N Internal users inappropriately accessing information such as payroll records, accounting records, or business development information. N Internal users accessing other users’ files to which they should not have access. N Internal users impersonating other users and causing mischief, such as sending e-mail under another person’s name. 143 Chapter 11: Securing Your Network N Internal users accessing systems to carry out criminal activities, such as embezzling funds. N Internal users compromising the security of the network, such as by accidentally (or deliberately) introducing viruses to the network. (Viruses are discussed in their own section later in this chapter.) N Internal users “sniffing” packets on the network to discover user accounts and passwords. To deal with threats such as these, you need to manage the network’s security diligently. You should assume that, in the population of internal users, at least some exist who have the requisite sophistication to explore security holes in the network and that at least a few of those might, at some point, try to do so. NOTE One of the more unpleasant parts of managing security is that you need to expect the worst of people, and then you must take steps to prevent those actions you expect. In other words, a certain amount of paranoia is required. It’s not a pleasant mindset, but it is required to do a good job in the security arena. Remember, too, that you’re likely to get better results if you hire an outside firm to help manage the network’s security. Not only should the outside firm have a higher skill level in this area, but its workers will be used to thinking as security people, and they will have invaluable experience gained from solving security problems at other companies. Perhaps even more important, using an external firm doesn’t put employees in the position of being in an adversarial relationship with other employees. Account Security Account security refers to the process of managing the user accounts enabled on the network. A number of tasks are required to manage user accounts properly, and the accounts should be periodically audited (preferably by a different person than the one who manages them daily) to ensure that no holes exist. Following are a number of general steps you should take to manage general account security: N Most network operating systems start up with a user account called Guest. You should remove this account immediately, because it is the frequent target of crackers (a hacker is a person who likes to explore and understand systems, while a cracker is a person who breaks into systems with malicious intent). You should also avoid creating accounts that are obviously for testing purposes, such as Test, Generic, and so forth. N Most network operating systems start up with a default name for the administrative account. Under Windows server operating systems, the account is called Administrator; under NetWare, it is called either Supervisor or Admin (depending on which version you are using). You should immediately rename this account to avoid directed attacks against the account. (Under NetWare 3.x, you cannot rename the Supervisor account.) 144 Networking: A Beginner’s Guide TIP As a safety measure, also create a new account to be a backup of your administrative account. Call it whatever you like (although less obvious names are better), give the account security equivalence to the administrative account, and safely store the password. If something happens that locks you out of the real administrative account, you can use the backup account to regain access and correct the problem. N You should know the steps required to remove access to network resources quickly from any user account and be sure to explore all network resources that might contain their own security systems. For example, accounts will be managed on the network operating system (and possibly on each server) and also in specific applications, such as database servers or accounting systems. Make sure that you find out how the system handles removed or deactivated accounts. If you delete a user account in order to remove access, some systems don’t actually deny access to that user until they log out from the system. N Work closely with the human resources (HR) department. Make sure that the HR staff is comfortable working with you on handling security issues related to employee departures, and develop a checklist to use for standard employment changes that affect IT. The HR department might not be able to give you much—if any—advance notice, but it needs to understand that you need to know about any terminations immediately, so you can take proper steps. Along the same lines, you should develop a set of procedures on how you handle accumulated e-mail, files, and other user access—both for friendly departures and terminations. Your relationship with the appropriate people in the HR department is crucial in being able to handle security well, so make sure that you establish and maintain mutual trust. N Consider setting up a program whereby new users on the network have their assigned permissions reviewed and signed off by their supervisor. This way, you won’t mistakenly give people access to things they shouldn’t have. N For publicly traded companies, the advent of the Sarbanes-Oxley Act of 2002 (discussed in Chapter 1) means you will likely need to set up a system to document how users of the network are added, modified, and removed from the system. This type of system usually involves a set of request forms initiated by the appropriate department (HR, accounting, and so on), signed by the individual’s supervisor and any other parties that need to authorize access to certain systems, and then documents the IT staff’s actions. These forms are then filed and will be examined by the company’s auditors. Password Security Another important aspect of account security is account password security. Most network operating systems enable you to set policies related to password security. These policies control how often the system forces users to change their passwords, 145 Chapter 11: Securing Your Network how long their passwords must be, the complexity of the password (alphanumeric, capital letters, or symbols), whether users can reuse previously used passwords, and so forth. At a minimum, consider these suggestions for password policies: N Require users (through network password policy settings) to change their main network password every 90 to 180 days. (Actually, 30 days is a common recommendation, but this might be too frequent in most environments.) N Set the reuse policy so that passwords cannot be reused for at least a year. N Require passwords that are at least eight characters long. For case-insensitive passwords that do not allow special characters, this yields potentially 36 8 possible permutations, or almost 3 trillion possibilities. And if the network operating system uses case-sensitive passwords, the possibilities are much larger: 62 8 (218 trillion). For systems that allow special characters to be part of the password (characters like a space, comma, period, asterisk, and so forth), the number of possible combinations is even higher still. NOTE Even 2 billion possible combinations for passwords is a lot. If crackers were able to try one password a second, they would need to spend 63 years to try that many permutations. Or, with an optimized program that can try 5 million possibilities a second, it would take about a year to crack an eight-character mixed-case password using brute force. N Encourage users to create passwords that are not words in any language or, if they are words, that they have numbers and other nonalphanumeric characters inserted somewhere in the word, so a “dictionary attack” won’t easily work. (Many password-cracking programs rely on dictionaries of common words and names to reduce dramatically the number of possibilities they need to try.) Also, for networks that support mixed-case passwords, encourage users to use mixed-case characters. N Make sure that you turn on any policies that monitor for and deal with people entering in wrong passwords. Often called intruder detection, this type of policy watches for incorrect password attempts. If too many attempts occur within a set period of time, the system can lock out the user account, preventing further attempts. I usually set this type of feature to lock an account any time five incorrect passwords are entered within an hour, and then lock the account until it’s reset by the administrator. This way, if users enter a large number of incorrect passwords, they will need to talk with the administrator to reopen the account. Usually, this occurs when users forgot their passwords, but someone else may be trying to guess passwords, so it deserves to be examined. 146 Networking: A Beginner’s Guide N Novell NetWare and Windows servers enable you to establish limits on when and where a user can log in to the network. You can establish times of day that a user is allowed to log in, and you can also restrict a user account to particular network computers. Doing so for all users on the network is usually overkill, but you might want to consider restricting the administrative account to several different workstations so someone at a different workstation (or coming in through a WAN connection) cannot log in to the account, even if that person somehow knows the password. There’s an interesting catch-22 concerning network security policies: If you make them too strict, you can actually reduce the security of your network. For example, suppose that you set the network to require 12-character passwords, to force a password change once a week, and to disallow the reuse of passwords. Most users will be unable to remember from week to week what password they’re using, and they will naturally resort to writing down their password somewhere in their office. Of course, a written password is much less secure than a remembered password. The trick with network security is to strike a balance between security and usability. Are There Alternatives to Passwords? There are a number of emerging alternatives to passwords that should make networks more secure, and also make network security easier on the users. The first alternative is something called two-factor identification. This is a system whereby the user carries around a small electronic device called a fob, which is about the size of a USB key. The fob displays a constantly changing set of numbers that are specific to that particular fob. The user remembers just a four-digit PIN. When users log in to the system, they enter in whatever number is currently displayed on the fob, plus their PIN. Because the network side of the system has a matching inventory of fobs and their sequence of numbers, and also has the user’s PIN, the user can be very securely identified. If a fob is lost, it can be easily deactivated in the system and a new one issued. Two-factor identification is often used for remote access identification. Another emerging alternative to passwords is the use of biometric data, such as fingerprint readers. Some notebook computers now come with integrated fingerprint readers that can quickly scan users’ fingerprints and log them in to a system. Other companies sell similar stand-alone devices. However, the vendors specifically state that they are not intended for corporate use. So, although such devices are not yet suitable for corporate use, security is rapidly moving in this direction. I believe the day is not far off when computers will routinely come equipped with fingerprint readers, and users will only have to touch their thumb to the reader to securely identify themselves to their systems. . Supervisor account.) 144 Networking: A Beginner’s Guide TIP As a safety measure, also create a new account to be a backup of your administrative account. Call it whatever you like (although less. would take about a year to crack an eight-character mixed-case password using brute force. N Encourage users to create passwords that are not words in any language or, if they are words, that they. strike a balance between security and usability. Are There Alternatives to Passwords? There are a number of emerging alternatives to passwords that should make networks more secure, and also make

Ngày đăng: 05/07/2014, 04:20

Mục lục

  • Part I: Networking Ins and Outs

    • 1 The Business of Networking

      • Understanding Networking: The Corporate Perspective

      • 2 Laying the Foundation

        • Bits, Nibbles, and Bytes

        • Basic Terminology to Describe Networking Speeds

        • 3 Understanding Networking

          • Knowing Network Relationship Types

          • Understanding the OSI Networking Model

          • Learning About Network Hardware Components

          • 4 Understanding Network Cabling

            • Understanding Cable Topologies

            • Installing and Maintaining Network Cabling

            • 5 Home Networking

              • Benefits from Home Networking

              • Choosing a Home Network Technology

              • 6 Understanding Network Hardware

                • Directing Network Traffic

                • Protecting a Network with Firewalls

                • Connecting RS-232 Devices with Short-Haul Modems

                • 7 Making WAN Connections

                  • Determining WAN Needs

                  • Comparing WAN Connection Types

                  • 8 Understanding Networking Protocols

                    • Understanding TCP/IP and UDP

                    • Understanding Other Internet Protocols

                    • Comparing Important Proprietary Protocols

                    • 9 Exploring Directory Services

                      • What Is a Directory Service?

                      • Learning About Specific Directory Services

Tài liệu cùng người dùng

Tài liệu liên quan