19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

326<br />

Part VI: Ethical Hacking Aftermath<br />

In Chapter 16, I cover the basic issues of determining how important and<br />

how urgent the security problem is. In fact, I provide real-world examples in<br />

Table 16-1. You should also look at security from a time-management perspective<br />

and address the issues that are both important (high impact) and<br />

urgent (high likelihood). You don’t want to try to fix the vulnerabilities that<br />

are just high impact or just high likelihood. You might have some high-impact<br />

vulnerabilities that, likely, are never exploited. Likewise, you probably have<br />

some vulnerabilities with a high likelihood of being exploited that, if they are<br />

exploited, won’t really make a big difference in your business or your job.<br />

This type of human analysis and perspective will help you stand out from<br />

the scan and run type assessments than many people perform and keep you<br />

employed for some time to come!<br />

Focus on tasks with the highest payoff first — those that are both high impact<br />

and high likelihood. Ideally, this will be the minority of your vulnerabilities.<br />

After you plug the most critical security holes, you can go after the less<br />

important and less urgent tasks when time and money permit. For example,<br />

after you plug such critical holes as SQL injection in web applications and<br />

missing patches on important servers, you might want to reconfigure your<br />

tape backups with passwords, if not strong encryption, to keep prying eyes<br />

away in case your backups fall into the wrong hands.<br />

Patching for Perfection<br />

Do you ever feel like all you do is patch your systems to fix security vulnerabilities?<br />

If you answer yes to this question, good for you — at least you’re<br />

doing it! If you constantly feel pressure to patch your systems the right way<br />

but can’t seem to find time — at least it’s on your radar. Many IT professionals<br />

and their managers don’t even think about proactively patching their systems<br />

until after a breach occurs. If you’re reading this book, you’re obviously<br />

concerned about security and are hopefully way past that.<br />

Whatever you do, whatever tool you choose, and whatever procedures work<br />

best in your environment, keep your systems patched! This goes for operating<br />

systems, web servers, databases, mobile apps and even firmware on your network<br />

infrastructure systems.<br />

Patching is avoidable but inevitable. The only real solution to eliminating the<br />

need for patches is developing secure software in the first place, but that’s<br />

not going to happen any time soon. A large portion of security incidents can<br />

be prevented with some good patching practices, so there’s simply no reason<br />

not to have a solid patch management process in place.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!