12.07.2015 Views

INTERNATIONAL ISO/IEC STANDARD 18028-1

INTERNATIONAL ISO/IEC STANDARD 18028-1

INTERNATIONAL ISO/IEC STANDARD 18028-1

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>ISO</strong>/<strong>IEC</strong> <strong>18028</strong>-1:2006(E)These Security Planes address specific security needs associated with network management activities,network control and signaling activities, and end-user activities correspondingly. Networks should be designedin such a way that events in one Security Plane are kept as much as possible and as appropriate isolatedfrom the other Security Planes.The following clauses include an introduction to the actual different real-world technical security architectureaspects of the various areas of networking.It is emphasized that the technical security architecture for any project should be fully documented andagreed, before finalizing the list of controls for implementation.13.2.2 Local Area Networking13.2.2.1 BackgroundWhen LAN networks are used within physically protected areas, e.g. only within an organization's ownpremises, then the risks are likely to be such that only basic technical controls are required. However, for usein larger environments, and also when wireless technologies are used (also see Clause 13.2.4 below),physical protection alone is unlikely to guarantee any level of security. Furthermore, the shared mediatechnologies most commonly used within LANs do allow access to all network traffic from any system usingthe shared media.The desktop is a vulnerable area as it is the user interface. If the desktop is not locked down then it is possiblefor a user to install unauthorized software on the LAN. Server systems used within the corporate network, bothones exposed to the Internet and internal servers that have no direct connection to the Internet, represent apotential major security risk. While most IT departments would claim that they are diligent about applyingpatches as soon as they are available, this risk has to be taken very seriously as even large organizationshave failed to patch all servers in a timely manner, leading to disruption of internal network traffic by worms.13.2.2.2 Security RisksIn a wired LAN, security risks will arise from the nodes physically connected to the network. Overall, the keysecurity risks associated with LANs include:— unauthorized access and changes to desktop PCs, servers, and other LAN connected devices,— un patched servers,— poor quality passwords,— theft of hardware,— failure of power supplies,— import of malicious code through e-mail and Web access,— failure to back up local hard discs,— failure of hardware, such as hard discs,— unauthorized connections to the LAN (laptop),— unauthorized access to hubs and patch cabinets,— default passwords on the management ports of hubs and switches,— poor physical security.© <strong>ISO</strong>/<strong>IEC</strong> 2006 - All rights reserved 29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!