IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Choosing the Right Person to Hold Network Security Access

22 October 2010 By Saran

If there is one thing to be learned from Mr. Terry Childs, a talented network engineer who was jailed due to computer tampering, you better be careful at who you choose to have administrative rights as far as network access and security is concerned. Apparently for some reason, Mr. Childs has refused to turn over the administrative passwords for the larger part of the San Francisco Department of Technology FiberWAN.

A petty issue with a run-in that he had with his agency had was said to be the cause of it all. But while that may sound off-topic, he has been tagged as becoming unstable and apparently this has lead to his being charged with four felony counts of computer tampering. The bail was set at $5 million dollars which most people including his lawyer said was crazy.

Let this be a lesson that the power of technology, once it goes to the wrong hands, may be entirely catastrophic. While technology breakthroughs are something to look up to, it remains that the people behind them have to be likewise trusted. Better yet, it would be best to have the technology guy and an authorized executive have access to make sure that nothing of this nature would occur as well.

Childs was said to be maniacal at the start so you have to wonder, why did you entrust the guy with the passwords and rights to the network security? Surely this was already a problem at the start and now that it has escalated towards paralyzing most of the operations only one man who is obviously psychologically disturbed holds the key to it. No wonder the bail was set at such a crazy amount of $5 Million!

Source

Filed Under: IT Security Basics, Network Security, News, Operating Systems, Real-World Issues, Security Policies Tagged With: computer tampering, felony, FiberWAN, Network Security, San Francisco Department of Technology, terry childs

Your computer and iptables

27 August 2010 By Saran

If you are using Linux and you have been wondering what you can use to make your system secure via a firewall, you could try out tools with graphical user interface and all those other stuff. In any case, there’s also another method: using iptables.

What are iptables?

iptables are used by system administrators in creating rules for packet filtering, as well as NAT modules. It might seem a little too weird for those who have not much experience on the command line but this is essential so that people would be able to make sure that they are secure, especially if they are connected. Sometimes you never know what’s going on in the background, right? But with tools like this, you’d manage.

There are different states of connection and the nice thing about iptables is that it monitors the state of the connection. It could do redirects and modify or stop data packets. Because of its ability to detect the state of the connection, it is considered as better compared to ipchains.

Making rules

The system administrator makes the rules for the iptables. These rules determine how to deal with network packets. They are grouped into chains.

a. filter table – For filtering packets, obviously.
b. nat table – This sets up how rewriting ports and packets.
c. mangle table – Does it sound terrible? Mangle? But as the name implies, there is some mangling involved because it adjusts packet options.

The thing about these chains, these rules is that the packets that go through these chains would be evaluated according to the rules.

As one of the people I know have told me, you must make sure that you check out the settings of your computer first. Before you even think about downloading anything, make sure you are not vulnerable to some attacks that could happen. Make sure that the important ports are closed and that you’re in stealth. Stay tuned for more IT security tips and news to help you in your everyday life.

Filed Under: IT Security Basics, Network Security Tagged With: computers, IT Security Basics, Network Security, networking, security

Network Assessment tools – for a better/secure network

25 December 2007 By Saran

netsecurity.jpg
In the time when people are going more and more mobile making the telecommuting concept a true reality, the existence of the wall-less office has slowly been realized. The shift to WiFi and other wireless networking solutions has allowed people to work like never before without the wires that tied them physically to desks. More and more areas like metropolitan areas are putting up hot spots that allow constituents to work within specific areas which already have existing wireless networks. Even offices have shifted to the technology due to cheaper implementation without the expensive wires needed for each and every workstation. Maintenance of said wired networks also proved to be a very challenging task due to the restricted spaces and conduits which housed them behind walls, ceilings and under the floors. WiFi allowed then network to function without physical connections allowing mobile devices to be connected and linked to the network which could be taken anywhere in the office.

The wireless office has indeed given us more in the area of freedom but it has also created a more vulnerable network for control on who gets which access and other security issues quickly emerged. Software and hardware systems like Retina from eEye Corporation allowed network engineers and managers to analyze and address security loopholes such as unauthorized devices connected to the network like the occasional iPhone and most other unauthorized wireless devices. It also serves as an analysis tools on the proper placement and function of wireless antenna which can be analyzed based on signal strength. Weak signals can mean re-positioning the antenna system or worse it could be a signal of a pending failure for a specific network device. It can also show the effectivity of the network in terms of utilization and bandwidth that is being effectively shared/used by the users.

[tags]Network Invetory, Network Usage, Maximizing Internet Use[/tags]

Filed Under: Cryptography, General, IT Security Basics, Network Security, Privacy & Anonymity, Real-World Issues, Security Policies, Wireless Security Tagged With: Data-integrity, Network Security, Wireless-Network-Security

Better Security by Thinking as a Hacker

23 October 2007 By Saran

The best way to find out the security breaches is to think like a hacker on how to penetrate a secure network through various means. Accessibility to servers may have to go through different stages since various encrypted usernames and passwords would stand in the way of a successful hack.

Network Hacker

The approach is quite simple. It is a reverse psychology of sorts since to become a full-proof secure system, ways on how to be able to get over the fences for such walls that have been put off must be severely tested.

Unorthodox as it may seem, the various approaches to be done will certainly be simple at this point because at the rate that hackers are able to go around security fences today, a lot of progress has been made in being able to make the lives of administrators a living hell as far as IT security is concerned.

[tags]hacker, network security, breach, coding, cracks, cryptography[/tags]

Filed Under: Cryptography, IT Security Basics, Network Security, Operating Systems, Privacy & Anonymity, Programming, Real-World Issues, Security Policies, Spyware Tagged With: breach, coding, cracks, Cryptography, hacker, Network Security, security

Disable that Shared Folder

1 August 2007 By Saran

Shared Folders

It would only be normal to find shared folders in the default setup of Windows operating systems. This can be easily seen once a person would go to the explorer option of his computer where shared folders are waiting to be accessed. This is automatically made for access if people connect to a network and would not set the security policies and accessibility on a restricted basis which only allows administrators to access them.

The importance of setting security levels to avoid such access to folders is important. Not al people are aware of the harmful things an unauthorized user may do once he gets the chance to intrude in another person’s workstation. Aside from probable back-ups, a person may lose the files contained in such folders if he is not careful. Hence it is best to do the precautionary measures before hand to avoid unwanted avoidable circumstances would ensue.

[tags]shared folders, security policy, network security[/tags]

Filed Under: Backups, Cryptography, IM, Instant Messaging, IT Security Basics, Network Security, Physical Security, Privacy & Anonymity, Security Policies, Storage, Tips Tagged With: Network Security, security-policy, shared-folders

What are Intrusion Detection Systems?

17 March 2007 By Saran

It has been a given that there are a lot of things that networks and workstations would be vulnerable to. At the top of the list are harmful files and sudden intrusions that are obviously up to no good. While resorting to firewalls may be seen as something that would prevent such attacks, intrusion detection systems cater more towards the inner system igniters, usually providing warnings prior to required action on the part of network administrators on the issue at hand.

Intrusion Detection Systems

Also, IDS monitors the behavior of the internal system since attacks of any sort may occur from files that can be initiated at any time or have already passed through the firewall for some reason beyond the set security policies.

It is a good practice to always check the network communications and identify possible security breaches. While intrusion detection systems can be able to apprehend abnormal processes, the presence of such intrusions within the internal system only proves that system and network security should be re-evaluated for stricter measures.

[tags]intrusion detection systems, network security, operating systems[/tags]

Filed Under: IT Security Basics, Network Security, Operating Systems, Security Policies, Tips, Wireless Security Tagged With: intrusion-detection-systems, Network Security, Operating Systems

Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security