Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)

A complete discussion of all of the possible risks to your network and computers could fill several books. Some of these threats, of course, are much more likely than others ”the risk that copper will suddenly stop conducting electricity, although real, is pretty remote, whereas the risk that a worm or a virus will attack your network is regrettably large. It s helpful to have a system to categorize threats in several ways, including by target, type, and severity.

What Makes a Target?

Everyone knows something confidential. Likewise, every company, no matter how small, has at least some data that it would prefer to keep confidential. Some companies (particularly those in the financial services or defense manufacturing industries) have data that is well worth stealing. Other companies might find themselves targeted because of what they do, who they employ , or where they re located. However, because most attacks are initiated by worms and viruses, most victims are randomly targeted. Targets can be grouped into three general categories:

You might think that no one would ever intentionally target your systems because your organization is too small to bother with, or none of your data or resources are valuable enough to attack. You might even be correct in thinking that (although, as I pointed out earlier, even small, unknown companies generally have information of value to dishonest employees or competitors ). However, because most attacks are incidental or opportunistic, it s well worth taking good protective measures just in case.

Attack Versus Defense

In war, the advantage typically goes to the defense because in infantry and armor combat the defender can prepare defensive positions that play to the strengths of the defenders equipment and terrain by forcing the attacker into predictable positions or actions. Regrettably for us, the opposite principle is true of computer security: the attacker has significant advantages that we cannot always counteract. Michael Howard of Microsoft has set forth a set of four principles that neatly sum up the problem we as administrators face:

As you read the material on classifying threats and on applying the two threat models covered in this chapter to your own work, remember these principles ” forgetting them can cost you dearly!

Classifying Threats

In his famous speech in the Book of Mormon, King Benjamin says, I cannot tell you all the things whereby ye may commit sin; for there are diverse ways and means, even so many that I cannot number them. (See http://scriptures.lds.org/mosiah/4/29 .) So it is with security threats: clever attackers are continually finding new vulnerabilities in software, systems, and communications protocols, so it s very difficult to come up with a comprehensive list of potential attacks that will remain useful over time ”especially because new software and hardware releases from our vendors can introduce new vulnerabilities that we might not find out about until after they ve been exploited. Worse, as attackers discover new vulnerabilities, there s no guarantee that the vendors will find out about them until they begin to be exploited!

Rather than a checklist of attack methods , it s more useful to classify threats into general categories, with a few specific examples of each:

It s important to note that for some of these attacks, there s no practical distinction between network- borne attacks and those that arrive through other means. Of course, penetration, DoS, and DDoS attacks are dependent on network connectivity, but the other types discussed here are just as feasible from a local workstation as they are from some far corner of the Internet.

Категории