Click Here!
Article Sections: | Internet Marketing | Web Design | Web Development | Business | Internet and Businesses Online | Self Improvement |  
>> Home > Web Development > Computers & Internet

Cyber Warfare

By Richard Lowe
Posted Friday, November 26, 2004

In these days of all-out combat in Afghanistan, terrorist attacks in New York and Anthrax in Washington, it's easy to lose one's perspective. I know I've become addicted to checking the major news web sites several times a day. I now listen to the news radio stations on the way to and from work instead of my normal rock and roll station. It seems like something might happen at any moment, and I want to know immediately.

Something that seemed to be mentioned in every IT related publication for the last year or so is the possibility of cyber warfare. This is the concept of attacking a country through it's information systems (specifically the internet).

Since the attacks I've seen the number of articles go from a few per week dozens per day. Warnings about security risks seem to be popping up all over the place. It is important that these warning be taken seriously - it's time to wake up folks and get your systems locked down.

What could be attacked? Just about every company has an internet connection these days. Many of those companies do not have good security, as is proven by the recent Nimda and Code Red outbreaks, as well as numerous penetrations by hackers.

If you are an IT manager you probably need to ask yourself some important questions to be prepared for the possibility of attack. In fact, it is your patriotic duty to be sure your systems are safe and secure. To do otherwise not only puts your company in danger, it actually threatens, even in a small way, the security of your country.

Does your organization really need to be attached to the internet at all? - This is the first question to ask yourself. I know it seems like every workstation at every company must be attached to the internet, is it really necessary? Does it add to the company bottom line? For many companies, the answer is yes, for others no.

Is the information that you provide to the internet community appropriate? - This question has come up on a large number of government and utility sites. Is it really necessary, for example, to include a map of a power plant? I know this might seem useful to, say, schools for educational purposes, but it may also be even more useful to terrorists and other evil-doers.

Is your backup and archive strategy sound? - The most important single task that you perform is backups. Do them regularly and check the data occasionally.

Are your password policies good enough? - The weakest link in most security schemes is the user and his or her passwords. If your management will allow it, make sure your users have long, complex passwords which they change regularly. Enforce best practices with their passwords.

If your front line security adequate? - Have you got firewalls installed? Regardless of whether you've got a home computer or a hundred million dollar complex, you'd better install a firewall if you have not done so already. A hardware firewall is the best solution, but a software one will do for a home system if money is tight.

Have you defined a DMZ? - If you manage a network for a company, you should reexamine your firewall strategy to ensure that you have a proper DMZ. What is a DMZ? To simplify it a bit, it's a way to protect your application servers even if your web servers are compromised. You have your core application systems behind a firewall. On the outside of that firewall you place your web servers. Then to protect them you put another firewall.

Is your virus protection adequate? - If you haven't installed antivirus software by this time, shame on you. It does not matter whether you run a network of ten thousand computers or a cheap home system, you'd better have this basic application not only installed, but regularly updating.

Is your system patched properly? - All vendors release software with bugs. It is the responsibility of all system managers to periodically review operating system and applications patches and releases and update them as needed. Remember, even the Apache web server is ridiculously insecure if not properly patched.

Are you educated on security? - If you haven't already, look around and find some books, classes or information about security. Become educated as fast as you can. Once you understand security, then propose, plan and implement what you have learned.

Do you perform background checks on IT related positions? - All new hires into IT should have thorough background checks before they are hired. You should also check the backgrounds of all of your IT consultants. It's best to know who you are hiring before you hire.

Is your user community educated about security? - Perhaps one of the best tasks you can perform is to educate your users on good security practices. Emphasize the reasons why security is important and how it protects your users. I usually stress that security penetrations are a direct threat to their employment. Spend some time explaining and demonstrating how social engineering works - this is the number one way break-ins occur.

Do you have a working disaster plan? - To be perfectly prepared, ensure that you have a working, tested, debugged disaster plan ready at all times. That way if for some reason your primary systems are rendered useless you can still have a running company.

Is your security plan confidential? - The less information you have available to evil-doers the better. Keep any information about how your systems are secured confidential - treat it on a need-to-know basis.

Remember this important fact. As of September 11th the United States and all of the free nations are in a war. And when your country is in a state of war you had better be prepared to be attacked. It's the only sane thing to do.

About the Author
Richard Lowe Jr. is the webmaster of Internet Tips And Secrets at (: - Visit our website any time to read over 1,000 complete FREE articles about how to improve your internet profits, enjoyment and knowledge.


Click Here!



  Articles are submitted to EDN and licensed from various content sites.
  To report abuse, copyright issues, article removals, please contact [violations (at@)]

  Copyright © Evrsoft Developer Network. Privacy policy - Link to Us

Contact Evrsoft