Protect Your Information with Intrusion Detection (Power)


Precise and reliable information on the components of your system and data, starting from the moment of their creation up to the time of their deletion, is the key to the successful detection of security violations. This enables the security administrator to compare standard conditions to the current state and detect all unauthorized changes in time. All resources are monitored, including the data (both system data and user data), systems (both hardware and software), networks (both hardware and software), workstations (hardware and software), applications and operating systems.

Approaches to intrusion detection are usually based on detecting the differences between the current condition of a controlled object and that recorded previously, under normal conditions. Security personnel must always know where a resource is located, as well as its status and contents. Without detailed information of this sort, it is impossible to detect when something has been added, modified, or violated.

Unfortunately, most organizations neglect this stage of planning, due to the fact that the process of registering a large amount of required information on various components of the information can be somewhat time-consuming and tedious. Quite often, specialists in information-security departments do not have the appropriate skills for obtaining this information, or have no access to all of the equipment that is connected to the network. Therefore, they must cooperate with specialists from IT departments, telecommunications departments, etc. Only through such cooperation can specialists obtain all of the required information. As practice has shown, the network map (if ever created at all) is developed in most cases at the stage of designing the information system. But companies often do not keep their system maps up to date, rendering them practically useless as the basis for controlling unauthorized changes. Another common mistake is that, quite often, the network map and all related information is created and stored only in IT departments, so they are not available to security departments, which impacts their work negatively.

Network Map

If you have not done so already, it is absolutely necessary to perform a detailed inventory of all hardware and software of the corporate network. All information must be stored in a database, where it will be easy to compare the initial inventory results to the results produced by all subsequent inventories. In the case of authorized changes, such as adding new equipment, or the replacement or deletion of existing equipment, it is necessary to introduce a system of timely modification of the inventory list.

Network-architecture inventory must include the following information:

The description of the network's architecture is the basis for the network map. Additionally, the network map might contain the following information:

The network map is not simply a document storing all of the required information. Instead, it is more like an atlas that includes different maps describing the same territory from different points of view (geographical, political, economic, etc.). In the same sense, the network map describes various aspects of the corporate network's operation.

To create the network component of this map, it is best to use various network-management systems (such as HP OpenView, SPECTRUM, Visio, etc). Such tools include the AutoDiscovery function, which allows administrators to update network maps automatically and trace all unauthorized changes in the network configuration. Information on the protocols used and the traffic characteristics can be obtained using various protocol analyzers. Security scanners can also be very useful, since they allow the detection of the following:

All devices detected within the corporate network must be grouped according to the following parameters:

You can also use automated tools for composing an inventory of the hardware and software. For workstations and servers running Windows 9x or Windows NT/2000, these mechanisms are already built into the operating system. For UNIX, there are similar programs, such as Strobe (ftp://ftp.cerias.purdue.edu/pub/tools/unix/scanners/strobe/) and fremont (ftp://ftp.cerias.purdue.edu/pub/tools/unix/netutils/fremont/), which allow you to determine which devices are connected to your phone line, system and network. Furthermore, there are third-party tools with a broader set of functional capabilities, for example, LAN Auditor (http://www.lanauditor.com/).


Категории