19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

I was once involved in an incident response<br />

project that involved over 10,000 Windows servers<br />

and workstations being infected with targeted<br />

malware. An advanced persistent threat<br />

(APT) had taken a foothold. The business found<br />

the infection early on and thought the IT team<br />

had cleaned it up. Time passed, and they realized<br />

a year or so later they had not cleaned up<br />

the entire mess. The malware had come back<br />

with a vengeance to the point where their entire<br />

network was essentially under surveillance by<br />

foreign, state-sponsored, criminal hackers.<br />

Paying the piper<br />

Chapter 17: Plugging Security Holes<br />

After dozens of people spent many hours getting<br />

to the root of the problem, it was determined that<br />

the IT department had not done what it should’ve<br />

been doing in terms of patching and hardening its<br />

systems from the get-go. On top of that, there was<br />

a serious communication breakdown between<br />

IT and other departments, including security, the<br />

help desk, and business operations. It was a case<br />

of too little too late that ended up getting a very<br />

large business into a very large bind. The lesson<br />

here is that improperly secured systems can<br />

create a tremendous burden on your business.<br />

This book presents hardening countermeasures that you can implement for<br />

your network, computers, and even physical systems and people. I find these<br />

countermeasures work the best for the respective systems.<br />

Implementing at least the basic security practices is critical. Whether installing<br />

a firewall on the network or requiring users to have strong passwords —<br />

you must do the basics if you want any modicum of security. Beyond patching,<br />

if you follow the countermeasures I document, add the other well-known<br />

security practices for network systems (routers, servers, workstations, and<br />

so on) that are freely available on the Internet, and perform ongoing ethical<br />

hacking tests, you can rest assured that you’re doing your best to keep your<br />

organization’s information secure.<br />

Assessing Your Security Infrastructure<br />

A review of your overall security infrastructure can add oomph to your systems:<br />

✓ Look at how your network and overall campus are designed. Consider<br />

organizational issues, such as whether policies are in place, maintained,<br />

or even taken seriously. Physical issues count as well. Do members of<br />

management have buy-in on information security and compliance, or do<br />

they simply shrug the measure off as an unnecessary expense or barrier<br />

to conducting business?<br />

✓ Map your network by using the information you gather from the ethical<br />

hacking tests in this book. Updating existing documentation is a<br />

major necessity. Outline IP addresses, running services, and whatever<br />

329

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!