Page 122 - StudyBook.pdf
P. 122
106 Chapter 3 • Communication Security: Remote Access and Messaging
Hacking tools are readily available on the Internet and can be found and used
by individuals who neither understand how to use them or the potential dangers of
the vulnerabilities they are exploiting.
NOTE
Novice hackers are known as “script kiddies” and “click kiddies.” Books
(such as Syngress’ Hack Proofing Your Network, Second Edition ISBN: 1-
928994-70-9) are available at local bookstores that provide information
on how different types of attacks are carried out. Hacking has become
so popular that underground networks for passing information and
techniques now exist. In today’s environment, a security professional
must be extremely diligent in the protection of their assets.
Communications-based Security
Security professionals are tasked with providing confidentiality, integrity, and avail-
ability to information passing over public (and private) networks. In terms of net-
work security, there are three methods of passing communications to a centralized
network:
■ On-site connection to the local network
■ Remote access
■ Messaging
Because more people are using the Internet, many companies offer their
employees the opportunity to work from home.This creates a dilemma for security
professionals, because they have to be able to meet the needs of the users and still
keep the company’s network secure. Remote access servers and VPNs are common-
place in most networks today. Major players in this arena are Microsoft (Terminal
Server), Citrix (MetaFrame), Cisco (Pix/ASA), and Juniper. Ensuring that the
implementation of these technologies is secure is as important as making sure they
work properly.
Since more and more employees are moving from simple mobile phones to
PDAs and smartphones, and because many companies provide employees with lap-
tops that come with wireless technology enabled, the security professional must
turn their attention to the securing of these “open air” technologies.
www.syngress.com