Upgrading and Repairing Networks (5th Edition)
| SOME OF THE MAIN TOPICS IN THIS CHAPTER ARE You've Been Targeted! 853 Computer Viruses, Trojan Horses, and Other Destructive Programs 854 Your Network Under FireCommon Attacks 857 Network Probes 864 Spoofing and Impersonation 864 If It's Too Good to Be True, It Isn't 865 Preventative Measures 865 Staying on Top of Security Issues 869 When all you have to worry about are the computers attached to your local LAN and users you know personally, it's easy to implement security policies and keep the network virtually safe from things such as viruses or other malicious programs. A properly trained user base, along with security guidelines that allow only outside programs approved for use on the network, can go a long way toward keeping a LAN safe. Of course, it still pays to regularly use an up-to-date virus-scanning program to be absolutely sure that you've cleaned up your network. When you connect to the Internet, however, there are so many different ways that your network can be compromisedeven when using a very well-secured firewall. At a company that this author consults for, a recent virus attack required over 500 man-hours to resolve. And, all of this was done in less than 24 hours by a dedicated team of network professionals. When you consider the number of personnel involved, you can get an idea of the reason why you should take proactive measures as best you can. Yet, in an enterprise network, you should have a staff that can handle such an attack. The only way to ensure that you can take care of this type of situation is not just to hire the most competent persons, but also to set aside some of your budget for ongoing training. Things change; things change even faster on the Internet. Note The SQL Slammer worm of January 2003 was illustrative of how fast things change on the Internet. This worm, capable of infecting the entire Internet within 15 minutes, has been called the Internet's first "Warhol" worm, in reference to the popular Andy Warhol quote, "In the future, everyone will be famous for 15 minutes." By most estimates, the SQL Slammer worm infected over 90% of vulnerable systems within 10 minutes of its first detection. Infected systems doubled every 8.5 seconds, and after only 3 minutes in the wild, the virus was scanning 55 million addresses per second looking for vulnerable machines.
Because of this, and other factors you will learn about in this chapter, it's best to learn about the most recent kinds of attacks and then locate resources to help you stay aware of the latest news. One of the most common misconceptions about firewalls is that they offer complete protection. However, studies bear out the following facts:
Consider a firewall to be only the first line of defense, not the only defense you put up for your network. This chapter looks at some of the typical problems that can be introduced into your network from the Internet and then at resources you can use to further educate yourself on these topics. |
Категории