Page 122 - StudyBook.pdf
P. 122

106    Chapter 3 • Communication Security: Remote Access and Messaging

                 Hacking tools are readily available on the Internet and can be found and used
             by individuals who neither understand how to use them or the potential dangers of
             the vulnerabilities they are exploiting.



              NOTE
                  Novice hackers are known as “script kiddies” and “click kiddies.” Books
                  (such as Syngress’ Hack Proofing Your Network, Second Edition ISBN: 1-
                  928994-70-9) are available at local bookstores that provide information
                  on how different types of attacks are carried out. Hacking has become
                  so popular that underground networks for passing information and
                  techniques now exist. In today’s environment, a security professional
                  must be extremely diligent in the protection of their assets.





             Communications-based Security

             Security professionals are tasked with providing confidentiality, integrity, and avail-
             ability to information passing over public (and private) networks. In terms of net-
             work security, there are three methods of passing communications to a centralized
             network:
                  ■   On-site connection to the local network

                  ■   Remote access
                  ■   Messaging

                 Because more people are using the Internet, many companies offer their
             employees the opportunity to work from home.This creates a dilemma for security
             professionals, because they have to be able to meet the needs of the users and still
             keep the company’s network secure. Remote access servers and VPNs are common-
             place in most networks today. Major players in this arena are Microsoft (Terminal
             Server), Citrix (MetaFrame), Cisco (Pix/ASA), and Juniper. Ensuring that the
             implementation of these technologies is secure is as important as making sure they
             work properly.
                 Since more and more employees are moving from simple mobile phones to
             PDAs and smartphones, and because many companies provide employees with lap-
             tops that come with wireless technology enabled, the security professional must
             turn their attention to the securing of these “open air” technologies.



          www.syngress.com
   117   118   119   120   121   122   123   124   125   126   127