Page 414 - StudyBook.pdf
P. 414

398    Chapter 6 • Infrastructure Security: Devices and Media

             files, or access network applications.As such, they are considered one of the most
             critical aspects of the network infrastructure and it is critical that they be as secure
             as possible.
                 Typically, people attacking a network use the information gathered from net-
             work devices, workstations, or data flowing across the LAN to compromise the
             security of the servers.There are other reasons for breaking into a network, such as
             setting up additional sites for performing a DDoS attack, but accessing the servers is
             usually the goal.
                 Since this is the primary storage location for data on a network, this is where
             attackers will be able to obtain the most data or cause the most damage. It can be
             said that these systems are the final goal of most attacks upon a network.
                 Most servers in a properly secured network are behind one or more firewalls
             and have several layers of protection between them and the outside world.
             Protecting these systems also includes physical security.There can be all the net-
             work security in the world, but it will not help when an attacker walks into a
             building and starts typing at the server’s local console. Some systems, such as Web
             servers, will always be more vulnerable due to their accessibility from the outside.
             Systems in a DMZ are less protected than those on a normal LAN.
                 Some of the same vulnerabilities that apply to workstations also apply to
             servers.The OS or application software may contain bugs or security vulnerabilities
             that allow the system to be compromised. In addition, some viruses are able to
             infect remote file shares; therefore, it is important to make sure that virus scanning
             is implemented on all of the servers.This especially applies to e-mail servers where
             an e-mail virus can be removed before it makes it to the end user’s e-mail box.
             Keeping OS and application software up-to-date with security patches is critical to
             minimizing the vulnerability of servers. Security professionals should always keep
             abreast of new bugs or vulnerabilities in the applications running on their network,
             and be ready to implement workarounds or fixes as soon as they are available.
                 It is always a good idea to make sure that the servers are as secure as possible
             from outside attack, but it is not wise to forget the possibility of attack from the
             inside.There are many cases where confidential data has been leaked from compa-
             nies due to poor security on their servers and an irate employee. It is important to
             make sure that the most restrictive access control possible is applied to the user’s
             accounts. Users should always have access to the data or services necessary to per-
             form their job functions, but no more than that.This goes back to the fundamental
             security concept of deny by default. It is always easier to grant a user access to data
             than it is to clean up the mess when a user has access to something that they
             should not have.



          www.syngress.com
   409   410   411   412   413   414   415   416   417   418   419