2008 – the main concerns of network and system administrators


Image : http://www.flickr.com

As with any year 2008 network and system administrators need to protect corporate networks are facing the challenges their ability to set properly. Experience shows that maintaining and improving safety is never easy, hackers, malware authors, spammers and other malicious insiders, mostly unpredictable, all items are added to the factors, the night instead give these network security professionals, some sleepless.

Various 2008 threatPredictions were the titles. Some mention VOIP and virtualization software, not to mention the evolution of malware and other widgets for Facebook, which are used to spread malware, however, facts and figures that the challenges in 2008 will face, not from the same technology because the technology is in its nature a neutral element, can be used in good or bad in one way. The biggest threat for 2008 is the same threat to firms in order was for the last 200,000 years – theMan!. The people, their weaknesses, mistakes and inquisition can all be used to wreck havoc in organizations.

Human Excessive

History shows that do, we tend too much credit, the supplier of operating systems and software providers of business expectations. The new systems are sold as a safe and fail-safe than their predecessors. While this is undoubtedly true, we must also consider that with each new version of the operating systemBusiness software vendors over the years all have the same claim, over and over again, year after year. This has never been. Indeed. discourage hackers and other malicious individuals research and execution of attacks on newer systems.

An example is Microsoft Windows Vista, the end of 2007, 10% of the market, but as expected, with a rate of 30% expected adoption by 2008. Microsoft Windows Vista is not only an equivalent new operating system, but alsoExperience a new user. Although this system is much safer than their predecessors, its users are still the same as before, and therefore the path of least resistance to environmental conditions of use of network medium. can easily be overcome through social engineering, security features like the new User Access Control, dupe users when the installation software that is insecure or tainted with malware.

misplaced confidence 'Human

Trustworthy and should notautomatically granted. The risks to the economy not only outside the enterprise perimeter lie and history shows that recent insider attacks cost companies as if not more, as the source of attack. Insiders have their advantages, because they have a deep knowledge of the network and its inner workings. In 2008, a growing proliferation of portable storage and communication devices (iPods, USB sticks, USB WiFi cars, etc.) is greatly facilitated dataTheft, logic bombs and other forms of sabotage, that your company can take back to the Stone Age. Again, while it may be easy to blame placed on these devices, these devices are not that bad, once again, technology is a neutral body. The main fault is the use of such devices made – not easy to ban them, because you can not just rely on voluntary compliance, monitoring can be tedious, can be easily hidden and peripherals are only Dissent.

lack of knowledge of man

When it comes to network security, through ignorance, nor happiness, nor an excuse. 2008, when the lack of basic safety principles and a lack of knowledge in the trends, malware, spyware, spam and other malware to take will contribute significantly to the destruction of the safety net. This is mainly due to lack of time or resource security principles for research and trends, a topic which translates into a concept of fire> Network security: Responding to events after the coup.

This is also a human problem. Malware not develop itself in a vacuum. The reason why malware is developed greed – Hackers and other malicious individuals to create targeted attacks today in order not to create chaos, but for profit. exploits aimed at making the address human nature curious, click on a link will attempt spoiled increasingly become commonplace. This makes them much more dangerousever, the lack of knowledge even more critical. Limitation of human curiosity, a general prohibition on access to resources as well go off to the back, because it produced both dissent and boredom, all of which hinder productivity.

Human gullibility

Its not just for you gullible object of scorn, but also among those with numerous threats to network security. In 2008, targeted e-mail spam in their development continues with new and innovative attempts toBreach network defenses with social engineering. This will extend e-mail and attempts to compromise VoIP infrastructure, for example, through denial of service attacks, vulnerabilities, and SIP Spit (Spam Over Internet Technology) attacks. In 2008, an increase in the number of attacks against individuals or companies will be targeted to expect, and it is highly plausible that the perpetrators of these attacks use social engineering to gain access to confidential informationInformation that can access your systems.

As for malware, social engineering attempts to develop the use of human credulity for profit. Nobody asks anyone who authorized for passwords, more subtle methods, such as targeted attacks on social networking sites (MySpace, Facebook, etc.) where users are duped into trading personal data to hackers and other virtual goods malicious individuals to prevent unauthorized access to networks win.
Completion

In 2008, network administrators and security will be with nature and wear hats most of the first and use all possible defensive measures against attacks human – hubris, confidence, lack of knowledge and gullibility are all key factors for the success of the network security will be. More than ever, it comes to addressing the risks, people representing the company, because even if the risks to humans are the same risks as before,The motivation behind the attacks in 2008, is changing and becoming more dangerous. The best way to defend against potential threats is the establishment of infrastructure for administrators to make methods:

or monitor user activity 24 x 7 x 365

or control access to network resources

or protection of all business information

Secure or all communications to, from and within society

Enact or technological barriers, the use of devices to allow a clear andpolicy set.

Train users or network resources, and network security policies and information disclosure.

In 2008, system administrators have the delicate balance that suits and encourages people's curiosity to see nature – without the dreaded medieval inquisitors!

April 24, 2010. Tags: , , , . computer network. Leave a comment.

Growing concerns and benefits of social networking websites

Social networking sites give almost everyone an opportunity not only to keep in touch with the people who have been part of their lives, but for those who can not meet them but to have similar interests. Therefore, these sites have good procedures for all information on the economy and share medicine, among others. to resolve, in reality was used to investigate and heinous crimes. For example, Eric Manis of Kingsport police, pending the completion of the suspendedperceived threats and comments against the participants at the Fun Fest in his MySpace profile page.

But then again, there is a concern of beer on social networking sites. A new trend in business today is that managers and other companies are administrators view their attention from the information will never dared to ask you get interviewed. There are so many of them unemployed, left because of details that can not find the company that areFit into their corporate mantra.

It 's also the problem of spam in social networking that is actually addressed to its users. And 'know that social networking sites, users can send messages with links that goes out of himself, or may be inside or outside the system to other social networking sites. This is where to spammers. Using the search feature of the social network, are then their eyes are onTarget market, in particular, on the basis of demographic data. They look like real people, who will start sending messages with links to pornographic sites and products.
Naturally there are concerns of privacy, particularly parents of underage boys. There have been reports of sexual violence, pornography and pedophilia, as the information provided, these children have been raised have been used by sexual predators to entice them to become their prey.

April 9, 2010. Tags: , , , , , . network tools. Leave a comment.

Design a site like this with WordPress.com
Get started