ad info

 
CNN.com  technology > computing
    Editions | myCNN | Video | Audio | Headline News Brief | Feedback  

 

  Search
 
 

 
TECHNOLOGY
TOP STORIES

Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

(MORE)

TOP STORIES

More than 11,000 killed in India quake

Mideast negotiators want to continue talks after Israeli elections

(MORE)

MARKETS
4:30pm ET, 4/16
144.70
8257.60
3.71
1394.72
10.90
879.91
 


WORLD

U.S.

POLITICS

LAW

ENTERTAINMENT

HEALTH

TRAVEL

FOOD

ARTS & STYLE



(MORE HEADLINES)
*
 
CNN Websites
Networks image


How to protect your network

Network World Fusion

July 4, 2000
Web posted at: 8:09 a.m. EDT (1209 GMT)

(IDG) -- ParaProtect, a network security portal in Alexandria, Va., reports that 90 percent of the security breaches its technicians work on are based on attacks from within. Even more shocking is that upwards of 50 percent are caused by the company's own network administrators.

So what can you do to protect your network?

Here's a list of tips culled from industry analysts, security experts, corporate executives and agents of the U.S. Secret Service:

  MESSAGE BOARD
 
  • Make sure no one person is controlling the system front to back.


  • Require every person logging on to use a password.


  • Assign supervisory rights to as few people as possible.


  • Back up all systems weekly.


  • Have a strict sign-in/sign-out system for backup tapes.


  • Always have a current copy of the backup tape stored remotely.

MORE COMPUTING INTELLIGENCE
IDG.net   IDG.net home page
  Network World Fusion home page
  Top Security News from IDG.net
  Are the days of the password numbered?
  Do handhelds need virus protection?
  Reviews & in-depth info at IDG.net
  E-BusinessWorld
  TechInformer
  Questions about computers? Let IDG.net's editors help you
  Subscribe to IDG.net's free daily newsletter for network experts
  Search IDG.net in 12 languages
  News Radio
  * Fusion audio primers
  * Computerworld Minute

  • Do backups of desktops and laptops as well as servers.


  • Rotate backup tapes - don't keep using the same one over and over again.


  • Change passwords every three months.


  • Keep servers in a secured area.


  • Stay up-to-date on software patches.


  • Use intrusion-detection software that alerts you when you are being hit.


  • Make sure two pairs of eyes have checked code before it is entered into the system.


  • Have an information security department (at least one person and then one other for every 1,000 users) that is separate from the IT department and reports directly to the chief information officer.


  • Spend at least 3% to 5% of the IS budget on information security. Train information security personnel to be aware of any employee who shows signs of being troubled or disgruntled, particularly if that employee holds an information-critical position.


  • Beef up security during certain events, such as mergers or downsizings, that could upset workers and cause them to lash out at the company.


  • Monitor the network - set up software that will alert you if the person is working in a different part of the network or at a different time than usual.


  • Scan e-mail to see what's going out of the company, double-check backup tapes and have someone else do the backups if that person is the one in question.


  • Make sure the person in charge of the system is not the same person in charge of the backup.


  • Have specific policies and punishments built into employee contracts.


  • Make sure critical IS workers are bonded.

How to protect your system if you're firing a network administrator:

  • Change everyone's passwords so he/she can't use them to break into the system.


  • Verify that your backup tapes are where they should be; make sure the information has been saved correctly and the tape is functioning properly.


  • Do a new backup.


  • Lock down every system that person had access to on the day of termination.


  • Have a new network administrator ready to step into the open position immediately.


  • Go up on the system and check user names and passwords, looking for anything unusual.


  • Make sure every logon has a password for it.


  • Lock down all the inside doors, such as the file servers, application servers and mail servers.


  • Look for backdoors on the system, such as Back Orifice on Windows NT.


  • Make sure there aren't any known vulnerabilities that haven't been patched - the administrator could have left those holes behind so he could get back in.


  • Strengthen your intrusion-detection system.


  • Set a trip wire - software that alerts the administrator to system anomalies, such as the size of a file changing.



RELATED STORIES:
Secret Service targets e-crime
June 28, 2000
Senate committee revises Internet security bill
June 22, 2000
New intrusion-detection devices debut
June 21, 2000
How personal firewalls work
June 21, 2000
Should you encode your e-mail?
June 16, 2000

RELATED IDG.net STORIES:
Top Security News from IDG.net
(IDG.net)
Are the days of the password numbered?
(PC World.com)
Do handhelds need virus protection?
(PC World.com)
Clinton signs digital signature law
(InfoWorld.com)
Cisco router software glitch opens security hole
(Computerworld)
Are cyberterrorists for real?
(FCW)
Chat clients may pose security threats, CERT warns
(Computerworld)
Cyber laws emerge, but slowly
(IDG.net)

RELATED SITES:
Para-Protect Services, Inc.

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

 Search   

Back to the top   © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.