101communication LLC CertCities.com -- The Ultimate Site for Certified IT Professionals
   Certification Communities:  Home  Microsoft®  Cisco®  Oracle®  A+/Network+"  Linux/Unix  More  
    CertCities.com is proud to present our sponsor this month: Thomson Prometric
Editorial
Choose a Cert
News
Exam Reviews
Features
Columns
Salary Surveys
Free Newsletter
Cert on the Cheap
Resources
Forums
Practice Exams
Cert Basics
Links Library
Tips
Pop Quiz
Industry Releases
Windows Certs
Job Search
Conferences
Contributors
About Us
Search


Advanced Search
CertCities.com

CertCities.com
Let us know what you
think! E-mail us at:
.. Home .. Certifications .. Cisco .. Columns ..Cisco Column Thursday, August 21, 2003

TechMentor Conference & Expo PDF Brochure - Download It Now!

Save 30% on CertCities.com's Guide to IT Certification on the Cheap

 Link State Update   Eric Quinn
Eric Quinn



 More than Secure...
Creating a network security plan that also works for your users.
by Eric Quinn , courtesy of TCPMag.com
9/18/2001 -- Last month, I talked about intrusion detection, but that’s only a small component of the whole kit and caboodle we call security. In order for you to have effective security, it must be planned. What happens if you build a small house with the plan of adding on to it in the future? If you add a single room or maybe a deck, then you’re usually OK. But if you add on four bedrooms, a deck, den, two bathrooms and a fireplace all over the span of 20 years, I’d bet that the house would look funny.

Planning security is essential to ease growing pains as much as possible while keeping your network secure. In my classes, we often allow students to telnet into real equipment to get hands-on experience; however, there are always some students who say they can’t access the equipment we provide because the firewall won’t allow telnet out. This is an example of a security policy hindering the growth of the company.

There are four broad security weaknesses: physical, technological, configuration and policies. Physical security is probably the easiest to do and one of the most overlooked. This includes things like propping the door open, leaving the door unlocked and not locking your PC when you leave it. (Not one of us has ever done that last one!)

Technological security is the toughest to stick with because we have to live with it if we want to use our tools. Does your company like getting e-mail? Then you have to deal with the many holes found within SMTP, TCP and IP. A technology problem is usually solved by a technology solution; so where there are many SMTP commands that aren’t safe, a PIX firewall can filter many of them out.

Configuration security problems are the "Doh!" of the security world. You forgot to require the user to change his password every 90 days or you may have given dial-in access to the wrong user. You have a configuration security problem when the technology does what you want it to, but you either misconfigured it or neglected to configure it.

Policy weaknesses are holes in your corporate policies. You can set the users so they have to change their password every 30 days, not use something similar to anything they’ve used before, and must use at least 10 characters with letters and numbers. This isn't going to fly unless management buys in. Not only does a security policy have to exist to have any chance of working, but everyone must agree with its necessity -- including execs and IT staff. The rank and file tends to rebel when it finds out that certain groups aren’t affected by an oppressive policy.

A security plan will help you bring these four components together so they play nicely with one another now and into the future. You need to identify the direction your company is going and figure out if your current policy will get you there. For instance, your company may be migrating to a pure Voice over IP solution using the Session Initiation Protocol (SIP), but your PIX firewall will break the connections unless you’ve upgraded to software version 6.0.

Security components can be found in many places beyond your typical router and firewall. If you need to terminate many VPN connections, look at a VPN concentrator. If you need to filter certain traffic crossing a 6000 series switch, you can use a VLAN Access Control List or VACL to accomplish this.

Remember, the ultimate goal of security is to secure the network while allowing people to do their jobs. A network can be locked tight -- that’s not a challenge. The challenge is making sure the network is useful while preventing the bad guys from getting in or preventing the bad guys in your network from doing more damage.


Eric Quinn, CCNP, CCDP, CCSI, is a security instructor and consultant. He is also co-author of the CCNP Remote Access Exam Cram by Coriolis Press. He writes the “Link State Update” column for TCPmag.com, and is a contributing editor for CertCities.com. Reach him at .

 

More articles by Eric Quinn:

Post your comment below, or better yet, go to our Discussion Forums and really post your mind.
Current CertCities.com user Comments for "More than Secure..."
10/19/01 - Arnold  says: i must say that i appreciate the clarity of the explanation of security weaknesses. however , how can intentional damage to hardware, software, and networks be prevented. thank you.
Add your comment here:
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comments:  
 
top

Sponsored Link:
Don’t let your IT Investment Go to Waste: Get Certified with Thomson Prometric!

Home | Microsoft | Cisco | Oracle | A+/Network+ | Linux/Unix | MOUS | List of Certs
Advertise | Certification Basics | Conferences | Contact Us | Contributors | Features | Forums | Links | News | Pop Quiz | Industry Releases | Reviews | Tips
Search | Site Map | MCPmag.com | TCPmag.com | OfficeCert.com | TechMentor Conferences | 101communications | Privacy Policy
This Web site is not sponsored by, endorsed by or affiliated with Cisco Systems, Inc., Microsoft Corp., Oracle Corp., The Computing Technology Industry Association, Linus Torvolds, or any other certification or technology vendor. Cisco® and Cisco Systems® are registered trademarks of Cisco Systems, Inc. Microsoft, Windows and Windows NT are either registered trademarks or trademarks of Microsoft Corp. Oracle® is a registered trademark of Oracle Corp. A+®, i-Net+™, Network+™, and Server+™ are trademarks and registered trademarks of The Computing Technology Industry Association. (CompTIA). Linux™ is a registered trademark of Linus Torvalds. All other trademarks belong to their respective owners.
All content copyright 2000-03 101communications LLC, unless otherwise noted. All rights reserved.
Reprints allowed with written permission from the publisher. For more information, e-mail