Secure Messaging with Microsoft Exchange Server 2000

A complete discussion of all of the possible risks to your network and computers could fill several books. Some of these threats, of course, are much more likely than others—the risk that copper will suddenly stop conducting electricity, although real, is pretty remote, whereas the risk that your network will be attacked by a worm or virus is regrettably large. It’s helpful to have a system to categorize threats in several ways, including by target, type, and severity.

What Makes a Target?

Everyone knows something confidential. Likewise, every company, no matter how small, has at least some data that it would prefer to keep confidential. Some companies (particularly those in the financial services or defense manufacturing industries) have data that is well worth stealing. Other companies might find themselves targeted because of what they do, who they employ, or where they’re located. However, because most attacks are initiated by worms and viruses, most victims are randomly targeted. Targets can be grouped into three general categories:

You might think that no one would ever intentionally target your systems because your organization is too small to bother with, or none of your data or resources are valuable enough to attack. You might even be correct in thinking that (although, as I pointed out earlier, even small, unknown companies generally have information of value to dishonest employees or competitors). However, because most attacks are incidental or opportunistic, it’s well worth taking good protective measures just in case.

Attack Versus Defense

In war, the advantage typically goes to the defense because in infantry and armor combat the defender can prepare defensive positions that play to the strengths of the defenders’ equipment and terrain. Regrettably for us, the opposite principle is true of computer security: the attacker has significant advantages that we cannot always counteract. Michael Howard of Microsoft has set forth a set of four principles that neatly sum up the problem we as administrators face:

  1. The defender must defend all points of vulnerability, including workstations, servers, stored passwords, communication links, and network access devices. The attacker can choose which point, or points, he or she attacks.

  2. The defender can only defend against vulnerabilities he or she knows about. The attacker is free to study the systems and networks to find new vulnerabilities and exploits for them. That means that you must stay alert to new classes of attacks and new vulnerabilities as they emerge.

  3. The defender must be constantly vigilant. The attacker can strike at will. Prime times for attacks are Sunday nights, any time during long weekends, or major holidays like Christmas or New Year’s—all times when administrators are less likely to be vigilantly watching for signs of an attack.

  4. The defender has to play by the rules, but the attacker can fight dirty. In particular, attackers can use specialized hardware or software; they can attempt to trick employees into giving them passwords, network addresses, or other useful bits of information, and they can gang up on a target.

As you read the material on classifying threats and on applying the two threat models covered in this chapter to your own work, remember these principles—forgetting them can cost you dearly!

Classifying Threats

In his famous speech in the Book of Mormon, King Benjamin says “I cannot tell you all the things whereby ye may commit sin; for there are diverse ways and means, even so many that I cannot number them.” (See http://scriptures.lds.org/ mosiah/4/29.) So it is with security threats: clever attackers are continually finding new vulnerabilities in software, systems, and communications protocols, so it’s very difficult to come up with a comprehensive list of potential attacks that will remain useful over time.

Rather than a checklist of attack methods, it’s more useful to classify threats into general categories, with a few specific examples of each:

It’s important to note that for some of these attacks, there’s no practical distinction between network-borne attacks and those that arrive through other means. Of course, penetration, DoS, and DDoS attacks are dependent on network connectivity, but the other types discussed here are just as feasible from a local workstation as they are from some far corner of the Internet.

Категории