26.07.2013 Views

WiMax Operator's Manual

WiMax Operator's Manual

WiMax Operator's Manual

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 9 ■ NETWORK SECURITY 191<br />

has had extremely unfortunate consequences. In the 1970s and 1980s, hackers tended to be<br />

young computer professionals, and because the knowledge base required at the time was so<br />

extensive, not too many of them existed. Today any computer-savvy adolescents with a yen<br />

to hack can easily equip themselves with the weapons to do so without understanding the<br />

mechanisms by which they operate. We are also seeing an increase in the activity of cyber-<br />

criminal gangs who commit computer crimes for profit. Many of these organizations operate<br />

in Eastern Europe.<br />

Fortunately, security software has kept pace with the democratization of hacking, and the<br />

security professional now has a large arsenal available. And while the number of products on<br />

the market is considerable, the basic approaches they embody are not numerous, and the network<br />

operator should be able to easily comprehend them.<br />

Cybersecurity Technology<br />

Previous chapters have already covered firewalls. Firewalls are the first line of defense for the<br />

security administrator, but they should not be considered complete security solutions in and<br />

of themselves. Closely related to firewalls and sometimes included in the category are proxy<br />

servers, which are devices where information requested from a database is actually launched<br />

onto the network or where applications are executed on client software remote from the main<br />

server. Proxy servers protect vital information and programs from direct access by outside<br />

parties, and they limit damage to nonvital facilities in the face of a network attack. In other<br />

words, they serve as buffers.<br />

Diagnostic software detects the presence of malicious code and unusual activity within<br />

the network. Antivirus scans form a subcategory within this grouping, though they are not the<br />

only such products to which such nomenclature applies. Diagnostic software may be roughly<br />

divided into two primary divisions: software used in security audits to determine the overall<br />

vulnerability of the network and software used routinely to detect anomalies. In both cases, the<br />

developer must continually update the software for it to remain effective.<br />

Some such software has the ability not only to determine the nature of an attack or intrusion<br />

but to find its point of origin—in other words, to follow the hacker back to a home base<br />

even across multiple networks. Such software must also be updated more or less continuously,<br />

since skilled hackers are always finding new ways to disguise their activities and identities.<br />

Security professionals often use encryption software to render vital data unreadable to<br />

hackers. Modern encryption methods are highly effective, and encoded material can only be<br />

decrypted by intruders who have access to massively parallel computing systems running for<br />

weeks at a time. Encryption techniques today use rounds, which are successive reencryptions<br />

that can number in the millions and make the encrypted data seem more and more random<br />

and meaningless. Essentially, there is no way to decrypt such messages by clever insights.<br />

Instead the intruder has to try out all possible codes one by one with a specialized decryption<br />

program. With enough computing speed, almost any machine code can be cracked, but such<br />

speed is not available to a lone hacker with a Pentium processor.<br />

Business records, customer profiles, and billing information should be routinely<br />

encrypted and should never be presented where they can be intercepted in decrypted form.<br />

Encryption is also advisable in VPNs.<br />

To sound a cautionary note, if grid computing services (see Chapter 3) become generally<br />

available in the future, then hackers will have a formidable weapon for decrypting formerly<br />

secure information, and at that point the encryption industry will have to come up with new

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!