19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

90<br />

Part II: Putting Ethical Hacking in Motion<br />

✓ Are safes used to protect backup media? Are they specifically rated for<br />

media to keep backups from melting during a fire? Who can access the<br />

safe?<br />

Safes are often at great risk because of their size and value. Also, they<br />

are typically unprotected by the organization’s regular security controls.<br />

Are specific policies and technologies in place to help protect them? Are<br />

locking laptop bags required? What about power-on passwords? Also,<br />

consider encryption in case these devices get into a hacker’s hands.<br />

✓ How easily can someone connect to a wireless access point (AP) signal<br />

or the AP itself to join the network? Rogue access points are also something<br />

to consider. I cover wireless networks in more detail in Chapter 9.<br />

✓ Are network firewalls, routers, switches, and hubs (basically, anything<br />

with an Ethernet connection) easily accessible, which would enable a<br />

hacker to plug in to the network easily?<br />

✓ Are all cables patched through on the patch panel in the wiring closet so<br />

all network drops are live as in the case of the unmonitored lobby area I<br />

mention earlier?<br />

This set-up is very common but a bad idea because it allows anyone to<br />

plug in to the network anywhere and gain access.<br />

Countermeasures<br />

Network and computer security countermeasures are some of the simplest<br />

to implement yet the most difficult to enforce because they involve everyday<br />

actions. Here’s a rundown of these countermeasures:<br />

✓ Make your users aware of what to look out for so you have extra sets<br />

of eyes and ears helping you out.<br />

✓ Require users to lock their screens — which usually takes a few clicks<br />

or keystrokes in Windows or UNIX — when they leave their computers.<br />

✓ Ensure that strong passwords are used. I cover this topic in Chapter 7.<br />

✓ Require laptop users to lock their systems to their desks with a locking<br />

cable. This is especially important for remote workers and travelers<br />

as well as in larger companies or locations that receive a lot of foot<br />

traffic.<br />

✓ Require all laptops to use whole disk encryption technologies, such as<br />

a PGP Whole Disk Encryption product (www.symantec.com/wholedisk-encryption)<br />

and WinMagic SecureDoc Full Disk Encryption (www.<br />

winmagic.com/products/securedoc-full-disk-encryption).<br />

✓ Keep computer rooms and wiring closets locked and monitor those<br />

areas for wrongdoings.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!