Page 432 - StudyBook.pdf
P. 432

416    Chapter 6 • Infrastructure Security: Devices and Media

                 Mobile devices provide a security leak simply because they allow confidential
             corporate information to be easily transported anywhere. In addition, many mobile
             devices provide methods to allow users to connect to a remote network. If these
             devices are not adequately secured, they can allow anyone who gains possession of
             the device to access the network. Securing communications going in and out of
             mobile devices is one method of combating this, and encrypting data stored on the
             device itself is another.
                 Coax cabling is an older style of network media that still has many limitations,
             which includes the fact that it is difficult to work with, is only good for short dis-
             tances, is limited to slower speeds, and is very vulnerable to breakdown. In most
             network designs using coax, a single break in the line can bring down the entire
             network.
                 UTP and STP cable are a step up, using multiple pairs of wires to provide net-
             work communication, which allows for greater distance, speed, and ease of use. In
             addition, most network designs using UTP or STP can work around a break in the
             cabling.A major vulnerability of both coax and UTP/STP cabling is that with the
             correct equipment, the network can be eavesdropped upon without having to con-
             nect to it.
                 Fiber-optic cable eliminates all of these vulnerabilities by using optical tech-
             nology rather than normal electronic technology.All communication takes place on
             a wave of light, which provides high speed and reliable communication. In addi-
             tion, it is not as vulnerable to eavesdropping and not at all vulnerable to EMI and
             RFI.The downside of using fiber-optic cable is that it is very expensive.
                 As far as removable media is concerned, magnetic tape was one of the earliest
             and most commonly used forms of data storage. It is still used regularly in backup
             systems and provides a low-cost solution to storing large amounts of data.
             Encrypting the data stored on the tapes and keeping the tapes secure are two good
             security practices. It is important to remember that magnetic tape is vulnerable to
             magnetic fields and can easily be erased with a simple magnet.
                 CDRs allow administrators to store a small amount of data on a sturdy plastic
             disk.They are not vulnerable to magnetic fields and are very portable.This leads to
             the possibility of a security leak of confidential corporate data. It is always wise to
             prevent CDRs or DVDs from being brought in to or taken out of a site.
                 Hard drives are considered removable media in that many servers have hot-
             swappable hard drives which allow a drive to be removed without having to open
             up the system.This could conceivably allow an intruder to simply walk out with
             data.This should be prevented with physical security for the data center itself, and
             by locking the drive chassis on the server.



          www.syngress.com
   427   428   429   430   431   432   433   434   435   436   437