WiMax Operator's Manual
WiMax Operator's Manual
WiMax Operator's Manual
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
CHAPTER 9 ■ NETWORK SECURITY 191<br />
has had extremely unfortunate consequences. In the 1970s and 1980s, hackers tended to be<br />
young computer professionals, and because the knowledge base required at the time was so<br />
extensive, not too many of them existed. Today any computer-savvy adolescents with a yen<br />
to hack can easily equip themselves with the weapons to do so without understanding the<br />
mechanisms by which they operate. We are also seeing an increase in the activity of cyber-<br />
criminal gangs who commit computer crimes for profit. Many of these organizations operate<br />
in Eastern Europe.<br />
Fortunately, security software has kept pace with the democratization of hacking, and the<br />
security professional now has a large arsenal available. And while the number of products on<br />
the market is considerable, the basic approaches they embody are not numerous, and the network<br />
operator should be able to easily comprehend them.<br />
Cybersecurity Technology<br />
Previous chapters have already covered firewalls. Firewalls are the first line of defense for the<br />
security administrator, but they should not be considered complete security solutions in and<br />
of themselves. Closely related to firewalls and sometimes included in the category are proxy<br />
servers, which are devices where information requested from a database is actually launched<br />
onto the network or where applications are executed on client software remote from the main<br />
server. Proxy servers protect vital information and programs from direct access by outside<br />
parties, and they limit damage to nonvital facilities in the face of a network attack. In other<br />
words, they serve as buffers.<br />
Diagnostic software detects the presence of malicious code and unusual activity within<br />
the network. Antivirus scans form a subcategory within this grouping, though they are not the<br />
only such products to which such nomenclature applies. Diagnostic software may be roughly<br />
divided into two primary divisions: software used in security audits to determine the overall<br />
vulnerability of the network and software used routinely to detect anomalies. In both cases, the<br />
developer must continually update the software for it to remain effective.<br />
Some such software has the ability not only to determine the nature of an attack or intrusion<br />
but to find its point of origin—in other words, to follow the hacker back to a home base<br />
even across multiple networks. Such software must also be updated more or less continuously,<br />
since skilled hackers are always finding new ways to disguise their activities and identities.<br />
Security professionals often use encryption software to render vital data unreadable to<br />
hackers. Modern encryption methods are highly effective, and encoded material can only be<br />
decrypted by intruders who have access to massively parallel computing systems running for<br />
weeks at a time. Encryption techniques today use rounds, which are successive reencryptions<br />
that can number in the millions and make the encrypted data seem more and more random<br />
and meaningless. Essentially, there is no way to decrypt such messages by clever insights.<br />
Instead the intruder has to try out all possible codes one by one with a specialized decryption<br />
program. With enough computing speed, almost any machine code can be cracked, but such<br />
speed is not available to a lone hacker with a Pentium processor.<br />
Business records, customer profiles, and billing information should be routinely<br />
encrypted and should never be presented where they can be intercepted in decrypted form.<br />
Encryption is also advisable in VPNs.<br />
To sound a cautionary note, if grid computing services (see Chapter 3) become generally<br />
available in the future, then hackers will have a formidable weapon for decrypting formerly<br />
secure information, and at that point the encryption industry will have to come up with new