Monday, 28 February 2011

Information Management

Information Management



Information Overload and Distraction
Computer users need to be aware of techniques for handling information in a way that will simplify their lives and sustain better mental health. When managing vast amounts and various types of information, remember to Prioritize, Organize and Sanitize.

PrioritizeWhen prioritizing information it is important to plan ahead. First, sit down with your computer and decide what you will use it for and how you would like to organize your information. Begin by creating folders and utilizing a priority scale ranging from 1-10.
To further prioritize, try eliminating distractions. If you are getting on your computer to work on a paper, do not turn on instant messaging programs. This will help you to stay focused on the task at hand. It may be helpful to change the settings on your instant messenger so that it does not come on automatically when you turn on the computer.

OrganizeTake the time to organize your files; it is important to delete and clean out unnecessary files. It is helpful to keep your files in the permanent Drive.When naming files, use meaningful names and abbreviations that you can recognize later, with no spaces. This will facilitate finding information that may no longer be fresh in your memory. Storing files in folders, labeled by course or project, can help organize them long-term. For larger files, you can burn them onto compact discs to help with storage.

SanitizeSanitizing your computer means cleaning out your trash folders, removing unwanted programs, and keeping your files orderly. Review your information periodically. If you don’t access a file within a specified time limit, remove it. Another step in keeping your computer clean is to make sure your virus protection and spy ware are updated.

E-mail Management
E-mail is supposed to accelerate communication – and it does. But the lack of interactivity and real-time communication, added to sheer volume, can also introduce problems. One problem is that you can’t create tone with e-mail, which increases the potential for misinterpretations. Then there is the lack of etiquette and standards, which also leads to communication snafus.
Some suggested guidelines might help you to make your use of e-mail more productive and more enjoyable:
Write the same way that you would for any other form of communication.
Use correct grammar. Bullet points make a message easy to read but sentence fragments do not.
Use the spell check that comes with your e-mail package.
Make e-mails self-contained with one subject and one message.
Unless you’re engaged in an ongoing conversation, include a greeting and closing.
Read messages a couple of times for clarity and tone before hitting the “send” button.
Don’t use your in-box as a catchall folder. Read items once, then answer immediately, delete or move them to subject specific folders.
Send group mail sparingly – use only when useful to all recipients. Use “reply all” with caution.
Ask to be removed from distribution lists you do not need to be on.
Before sending an attachment in a particular format, make sure the recipient can open it.
Respond to your messages as quickly as possible, preferably by the end of the day.
Don’t be a novelist!
Be careful about using smilies. Not every one interprets them the same way.
Don’t flame. You can’t take it back.

http://www.thepurplegenie.com/healthycomputing.htm
Healthy Computing:
Take advantage of this e book on Healthy Computing that includes all of the tools and tips you need to quickly and easily understand and practice a quality work style with your computer that you will be comfortable and healthy.

Healthy computing.

Ergonomics

Healthy computing.
Proper ergonomics - design factors intended to maximize productivity by minimizing operator fatigue and discomfort - is very important for maintaining a healthy body while computing. The following are a number of links which contain information on and tools for maintaining proper ergonomics.
Information on Laptop Ergonomics and Useful Products - This article from HealthyComputing.com provides information on the basics of ergonomics as well as suggestions for products which help to increase ergonomical use of laptops.
Five Tips for Ergonomical Laptop Use - Cornell University provides five helpful tips for proper ergonomical use of laptops.
Laptop Ergonomics - Cornell University provides further information on the basics of ergonomics.
Self Assessment Tool - This questionnaire from Key Tools Ergonomics helps you to assess how you use your laptop and provides suggestions for better usage.

How To Work on Your Laptop and Stay Healthy
1. Learn how to maintain a relaxed, neutral posture that reduces stress and strain to your muscles by:
· Schedule mini-breaks every 20 to 30 minutes to avoid repetition and static postures.
· Maintain a comfortable viewing distance from your notebook screen - about 18-30".
· Keep your head and neck in a relaxed posture; avoid excessive neck flexion or rotation.
· Position the keyboard at elbow height and keep your wrists straight while keying.
· Experiment with table and chair height as well as keyboard angle to maintain neutral wrist postures.
· If you have to raise your chair, use a footrest to support your feet. When seated, your hips should be slightly higher than your knees.
· Add an external keyboard and place it on an adjustable keyboard/mouse platform.
· Attach an external mouse instead of using the small constricted touchpad or trackball.
· Tilt the screen so that it is perpendicular to your line of sight, if lighting permits.
· If you are sitting in a side chair or couch, use a pillow to support your arms while keying.
· Clean the screen regularly using appropriate antistatic cleaning fluid.
· Your hands and wrists should be kept in a straight wrist posture when typing and should not be resting on a palm rest, table or lap while typing.
· Did you know: wrist and palm rests are designed to provide support during breaks from typing.
2. Carry your laptop computer ergonomically:
· Remove unneeded baggage from your notebook case, the less weight to carry the better.
· Carry your laptop in a case with padded should straps and handle. Frequently shift shoulders to balance the load.
· Do yourself a favor by buying a wheeled laptop luggage cart that easily transports your laptop and accessories like laptop printer, laptop cables, paper and other utensils.
*Posture tips adapted from Ergo In Demand.

http://www.thepurplegenie.com/healthycomputing.htm
· Healthy Computing:
Take advantage of this e book on Healthy Computing that includes all of the tools and tips you need to quickly and easily understand and practice a quality work style with your computer that you will be comfortable and healthy.

Laptop Security

Laptop Security

Healthy computing.
Laptop security measures include taking care of the physical security of the laptop, securing laptop contents from unwanted eyes, and tracking down a stolen laptop. There are several ways to increase laptop security. Below is a short review of the most common ones.
Engraving / Marking – One option is to permanently mark (or engrave) the outer case of the laptop with your name, address and phone. It is also a good idea to engrave or place an adhesive label on the underside of the battery compartment where your identification is not noticed or can be readily removed. Include your name, address and date of birth. Do not use a Social Security number.
Record Keeping - Register the laptop with the manufacturer. This will “flag” your machine in the event that a thief ever sends it in for maintenance, and increases your odds of getting it back. It is also important to write down your laptop’s serial number and store it in a safe place. In the event your laptop is stolen, it is extremely important to have these numbers to give to the police. .
Cable Locks - Cable locks are an inexpensive way to secure the laptop from being stolen. The cable locks function much in the same fashion as bicycle cable locks do. The cable is wrapped to an immovable object (such as a table leg) and the security clip in the laptop. The system is secured with a padlock. While this is a quick and easy security measure, it is still vulnerable, much in the same way as bicycle cable locks. Remember however if you have taken the means to secure your laptop, a thief more than likely will go to the next laptop they find unsecured.
The following links are good resources for laptop physical security devices:
Secure-It: http://www.secure-it.com/products/notebook/laptop_cables_locks.htm
Beach Audio: http://www.beachaudio.com/index.php?cPath=206_236_2568
Alarms - Alarms work much in the same way as car alarms. If the laptop is moved or handled without authorization, the system will give a warning signal that resembles the ones heard in cars (there are other optional ways to make the alarm). There are many different kinds of alarm systems. The simplest ones are integrated into the cable lock, which, if broken, will start the alarm. These alarms can be purchased at office supply stores.
http://www.etravelergear.com/traclapprot.html
Laptop Tracking - Similarly to stolen cars, also stolen laptops can be tracked and recovered. The most advanced of these tracking systems use the cell phone network (or satellite via GPS) to communicate the laptops location with the central tracking computer. This system depends on a piece of hardware, placed inside the laptop.
Another way to increase security of the laptop and track stolen laptops is via a software tracking code placed in the laptop's hard drive. The software, which resides undetected, will communicate periodically with a central system through the Internet. The software communicates the laptop’s location, which will enable recovery of the laptop. Individuals can get more information about laptop tracking and purchase software from these and other companies: CompuTrace, SecureIT, Stealth Signal, and ZTrace.
Your laptop can also be registered with the STOP Program. If you loose your laptop, STOP works with the local police, the FBI, and INTERPOL to track it down. And, once STOP locates it, STOP takes care of returning it to you.
User Identification - The most obvious security measure in this regard is using the BIOS password. More advanced ways to identify the laptop user are smart cards and biometrics, such as voice or fingerprint recognition software and hardware.
Protect your data by locking your PCMCIA cards when not in use. Eject these cards from the laptop bay and lock them in a safe place whenever you are away from the laptop.
Information gathered from LabMice.net and Laptop-guide.com
6 Tips to Help Prevent Laptop Theft
When on the move, keep your belongings in sight and never leave your laptop unattended.
Try not to leave your laptop in a vehicle. If you must, ensure it's in the trunk or covered up - not in plain view.
Don't leave a meeting or class room without your laptop. Take it with you, or it may not be there when you return.
Lock your laptop in your room during off-hours. Or put the laptop in a locked closet or cabinet.
Utilize Kensington style cable and lock for your laptop when left unattended.
Install Computrace on your PC, so if it’s lost or stolen you have a greater chance of getting it back or receive up to $1000.

Removable Storage/ Drive Security
As computer systems such as the laptop become more portable, use of removable storage devices (RSD) also become more convenient. Balancing “security with convenience” is very difficult to achieve. A good example is the convenience of items such as the ever-growing popularity of the “Flash or Jump Drive”, external hard drives and removable drives. Unfortunately, loss or theft of your portable storage devices is easy and presents numerous problems. Not only have you lost potentially valuable data, depending upon the contents of your device you may have opened yourself up to identity theft. Keeping your portable devices secure and accounted for is just as important as keeping your laptop secure. Following are few tips to help balance “convenience and security”.
Always have your RSD in your possession or locked away when not in use. Never leave your laptop and device unattended in the Library or other study areas.
Never place personal identifying information such as Social Security Number, Phone Numbers, Bank / Credit Card numbers, passwords, etc…
Don’t be distracted away from your Laptop with your Flash Drive connected. It only takes a second for someone to unplug your device and walk away undetected.
Consider the use of “Thumb Drives” that require your thumb print be used to access the information on your device. You may also want to use drives that encrypt your information for added security.
Just as important as Flash Drives, you should take the same care to secure date CDs, Floppy Disks, Zip Drives or any type of RSD.
While we often believe bigger is better, it may be more beneficial to have a few 32MB drives than it is to have a 1GB. For certain smaller projects you may want to consider using a CD to store data. This allows you to use your collection of drives or CDs for different purposes or projects. If you loose one you haven’t lost everything. The important habit becomes keeping track of all your discs or drives to ensure their security.
Always back-up your important data and secure your back-up discs/drives. A good practice on campus is to use your “P” drive as a back-up.
As with all computer hardware and information, security is paramount. All your hard work and research is of no use if you have not practiced good security procedures and your information is lost or stolen.

http://www.thepurplegenie.com/healthycomputing.htm
Healthy Computing:
Take advantage of this e book on Healthy Computing that includes all of the tools and tips you need to quickly and easily understand and practice a quality work style with your computer that you will be comfortable and healthy.

Computer Security

Computer Security

Healthy computing.

One of the most important steps in healthy computing is keeping your computer and the information on it secure. Doing this will protect your computer, your identity. Here are some basic security tips.

What is computer security?
Computer security refers to the measures taken by individuals like you and organizations to protect technology resources. In recent years, security threats--such as viruses, worms and identity theft-- for individuals and organizations alike have increased greatly due to the fast-changing nature of technology and the internet. Although there is no one solution for ensuring healthy computing, following some basic steps can help reduce your risk of a security attack.

  • Who is responsible for computer security?
    Healthy computing is every user’s responsibility. While there are laws governing a number of technology-related activities and security measures that can protect large groups of computer users at the same time, individuals must protect themselves from the risks created by hackers, viruses, worms, and identity thieves.

    Ten Steps to Safe Computing
  • Fend off computer viruses by using Anti-virus software regularly and using caution when opening email attachments and sharing files.
  • Download operating system (OS) patches and updates.
    Go to Windows Update now.
  • Set up spam filtering on your campus and/or personal email account(s).
  • Consider installing a firewall.
  • Minimize your risk of identity theft by using caution when shopping online, instant messaging or using wireless services.
  • Remove spyware and adware from your computer with anti-spyware and anti-adware.
  • Protect confidential data by running data backups on a regular basis.
  • If your computer or personal information has been compromised in any way, report the security incident to the appropriate authority.
  • Periodically check for security news and alerts.
  • Share this list with friends and family

Healthy Computing:
Take advantage of this e book on Healthy Computing that includes all of the tools and tips you need to quickly and easily understand and practice a quality work style with your computer that you will be comfortable and healthy.

Wednesday, 23 February 2011

COMPUTER SECURITY

 

As the Internet has transformed business computing and communications, it has also given rise to unprecedented computer security threats. Whereas traditional computer security was concerned with limiting the physical access to corporate systems and the misappropriation or vandalism of data by internal users, the Internet has opened up diverse and complex security problems on a scale much greater than that previously known. The rapid advances in the speed of corporate networks may only exacerbate this problem, as some existing security software may not be able to keep up with the higher speeds of data transfer. Annual losses from computer security breaches, although difficult to pinpoint exactly, are believed to be worth some $10 billion in the United States alone. Specific risks include
  • the spread of computer viruses
  • infiltration and theft of data from external hackers
  • engineered network overloads triggered by malicious mass e-mailing
  • misuse of computer resources and confidential information by employees
  • unauthorized financial transactions and other kinds of computer fraud conducted in the company's name
  • electronic surveillance of corporate computer data by outside parties
  • damage from malfunction, fire, or natural disasters
A host of software and hardware solutions have been developed to combat these threats, but the new and rapidly changing nature of the technology requires that corporate system security managers be extremely well versed on how the risks specifically affect their systems. With issues so complicated and security so critical, establishing a comprehensive computer security system often requires the expertise of consultants and professional computer security firms.

THE SCOPE OF THE THREAT

A widely cited annual study conducted by the Computer Security Institute and the FBI indicates that the majority of large businesses experience one or more computer security breaches, broadly defined, each year. In addition, a significant percentage of companies surveyed—about a fifth—aren't sure whether they've experienced a security lapse. Given standard estimates that only a fraction of computer crimes are ever detected, it is safe to assume that many of the companies that report not knowing have had their systems violated in some way. In the 1999 survey, only 17 percent of companies asserted that they had not experienced any form of unauthorized use of their computers. Among the 163 companies in the survey that could quantify their losses, the average annual loss was more than $750,000.
While the authors of computer crimes are usually never positively identified, the overwhelming majority of companies attribute at least some of their security violations to disgruntled or crooked employees. Corporate security managers believe that independent outside hackers are the second most common group of perpetrators. Surprisingly, a large number of companies also attribute their computer security threats to domestic and foreign competitors, as well as to foreign governments.
In monetary terms, the most damaging breaches of computer security involve (1) the theft of trade secrets; (2) unauthorized and fraudulent financial transactions (for instance, when an employee surreptitiously changes his rate of pay on the payroll system); (3) system break-ins by outsiders; (4) telecommunications fraud, in which an attacker gains use of a company's phone lines or other telecommunications resources and charges up large bills; and (5) computer viruses.

ORIGINS OF COMPUTER SECURITY

The computer's power to enable humans to handle mathematical and cryptological problems on an unprecedented scale has prompted governments to keep their use subject to the tightest security from the very beginning. In fact, details of the first operational digital computer, the Colossus, were not made public until 1975. Until that time, the UNI VAC I, developed at the University of Pennsylvania and operational in 1946, was thought to have been the first.
The Colossus was first put into service by the British government in 1943. It was used in cryptanalysis (the breaking of codes), specifically against the German Enigma communication codes. So sensitive was the information handled by the Colossus that mere knowledge of the machine's existence was limited to a few individuals. The computer was kept in a sealed room and was not connected to other computers or to any phone lines.

CRIMINAL THREATS AND HACKING

The postwar use of computers for business produced two important developments: timesharing and remote connections. Economies of scale required that early computers, which were rare and very costly, be kept running as much as possible. One way to do this was to allow users access at different times, facilitated by the use of either dedicated lines or public telephone lines connecting the computer to remote users. However, the security vulnerabilities these measures produced would be exploited by a new breed of bandit, the hacker.
Early use of the term "hacker" was applied to computer hobbyists who spent their spare time creating video games and other basic computer programs. However, this term acquired a pejorative connotation when some of these amateurs created a scare by violating important databanks in the 1980s through hacking. Databases at the Los Alamos National Laboratory (a center of nuclear weapons research) and the Sloan-Kettering Cancer Center in New York City were among their targets. The introduction of relatively inexpensive personal computers and modems helped make this pastime affordable; the use of regular telephone lines as accessways made it possible. Automatic dialing programs, used to call all numbers in an exchange and to determine the ones answered by computers, were among many tools hackers used to simplify their work. The designation "hacker" has also been given to programmers and disseminators of computer viruses. The military and some corporations have used "tiger teams" employing some of the same tactics as hackers to test the security of their networks.
Even more serious threats exist than the highly publicized hackers. The vital information kept in computers have made them a target of government and corporate espionage, as well as fraud and embezzlement. Computer hardware itself has been a target of vandalism by disgruntled employees and even terrorists.
Security has been defined as "the protection of assets." Assets that can be stored or transmitted by computers include electronic fund transfers between banks. Proprietary information, such as product designs and databases containing information about clients, as well as other data files and computer programs themselves, must also be protected; they can be easily destroyed by computer viruses or unauthorized hacking. It can be difficult to place a dollar value on these assets, especially when such factors as potential loss of reputation or liability issues are considered. In some cases (e.g., military and hospital applications) there is a potential for loss of life due to misplaced or destroyed data; this cannot be adequately conveyed by risk analysis formulas. The question most users face is not whether to practice computer security measures, but how much time and effort to invest. Larger firms must incorporate procedures and policies for dealing with computer security issues; however, some basic principles apply to most applications regardless of scale.
Information is vulnerable to theft or misappropriation whether it is stored in memory or transmitted over cables. It must also be guarded once it reaches peripherals such as printers; one woman was able to print 200 paychecks for herself by simply pressing the repeat button on a printer. Data has also been gleaned from printouts found in trash baskets. This was one of many ways a teenager stole information from a telephone company in southern California in the 1970s and used it in a scheme to order supplies charged the company's account, much like using a stolen credit card. The criminal merely picked up the merchandise at the company's loading dock, taking advantage of the premise's lack of security controls.
Law enforcement agencies have developed specialized techniques for prosecuting crimes specific to computers. Since 1976, computer crime fighting techniques have been part of standard FBI training. The Computer Fraud and Abuse Act of 1986, passed 10 years after the first federally prosecuted case involving criminal use of a computer, attempted to address this type of crime; most states have adopted similar statutes. A decade later the federal Economic Espionage Act of 1996 added greater penalties for stealing trade secrets, whether electronically or otherwise. The 1996 act, backed by a few high-profile FBI corporate espionage busts under its provisions, was believed to have strengthened companies' resolve to prosecute computer breaches and other attacks on their privileged information.
Physical access to computers can be limited using automated office security devices, including power-on passwords; magnetic card readers; proximity readers; and biometrics, which verifies the user's identity through matching patterns in hand geometry, signature or keystroke dynamics, DNA fingerprinting, retinal imaging, or voice recognition. More traditional site-control methods such as sign-in logs and security badges can also be useful.

OTHER SECURITY THREATS

Not all threats to computer security are from parties with criminal intent, however. Computer supplies and hardware must also be protected from both environmental forces, such as power surges, floods, and fires, and simple operator incompetence, such as the careless handling of floppy disks.
The fundamentals of any computer security program begin with the environmental conditions the computer requires to operate properly. Adequate power must first be provided. Due to the distances electricity must travel, its nominal voltage may drop 10 percent by the time it reaches the computer. In addition, drops in voltage or blackouts can occur due to utility switching problems or to lightning strikes at the utility company. Besides the potential for loss of unsaved data, there exists the possibility of "disk crashes," or damage to the disk due to contact with the read/write heads. Also dangerous are "spikes," sharp increases in voltage that can seriously damage hardware. A variety of voltage regulators, surge protectors, grounding techniques, and filters exist to combat these problems. In the 1990s, intense activity centered on the development of uninterruptible power systems that use storage batteries to ensure a smooth transition between power sources in the event of power failure. Local area networks as well as individual computers can be protected by these devices.
Fire is another important threat to computer systems. Their susceptibility to fire damage is exacerbated by the flammability of paper supplies likely to be stored in close proximity. Plastics used in the manufacture of computers can produce explosive gases when exposed to high temperatures. A common safety measure, water sprinklers, can further damage computers, especially if the computers are turned on. The use of fire-resistant construction materials, fire walls, vent closure systems, etc., are standard ways to mitigate the threat of fire. Special attention should be given to fire detection and personnel should be trained in the use of hand extinguishers. Carbon dioxide and Halon 1211 gas extinguishers are suited for use near electronic equipment because they do not leave a residue.
Other physical security concerns include protection against excessive heat, humidity, and water, which can be introduced by flooding, burst pipes, or "operator error" (spilled beverages, etc.). Electronics equipment can also be damaged by airborne particles and cigarette smoke; smoking is also a potential fire hazard. Plastic covers can protect the machines somewhat from dust particles and falling water. Organizations vitally dependent on data processing facilities should prepare contingency plans for disasters such as hurricanes, earthquakes, or blizzards. Ideally, backup facilities should be located far enough away to be spared the disaster, but not too far to be reached quickly.

COMPUTER VIRUSES

The next level of security involves protecting software from viruses, "logic bombs," and "Trojan horses," all of which have the capacity to disable computer systems by infecting software. In common usage all such programs are termed viruses, and as of 1998 experts believed there were some 16,000 of them in existence. A conventional computer virus is a program that is self-replicating, attaches itself to other programs, and generally performs some sort of function. An early virus demanded a "cookie," and after the word was typed it would disappear for a time. A later virus caused all the characters on the screen to fall to the bottom. Originally a hobby of programmers (an experimental virus was demonstrated as far back as 1974), viruses eventually appeared with sinister missions.
The Pakistani Brain is one that can drastically affect a computer system. This virus was developed in 1986 by two brothers from Pakistan as an experiment in preventing use of unauthorized copies of software. The original strain changed the volume name of disks to "(c) BRAIN" once it has infected them; however, mutations have been produced that are not as forthcoming about their identity. The virus inserts its code into the boot sector of a disk, making it the first data loaded into the computer upon startup, before any anti-viral programs can be executed. The original version spread through bootable floppy disks; however, variations have been written that can affect hard drives. Its code is difficult to locate because of measures it uses to counteract standard anti-viral programs and its method of recording parts of its code in disk sectors marked "bad."
Another type of insidious program is the "Trojan horse," which performs an intended function but also a covert one. Computers users have become more savvy and cautious about sharing software; however, these types of programs continue to exist. Examples include a program ostensibly designed to increase monitor performance that instead erases the entire hard drive. True Trojan horses typically operate in the background of a valid program, such as a video game. Trojan horses have also been used for "salami" techniques—banking programs that compile the results of rounding errors in a large number of computations and add them to the perpetrator's account.
"Logic bombs" are viruses that are programmed to perform a task once a particular set of conditions is met; the most famous are "time bombs" set to go off on a significant date, e.g. the "Friday the 13th" virus and the "Michelangelo" virus. These viruses activate at a given date or time. Logic bombs have been set by programmers to cause damage if their names are ever deleted from payroll records. The Pakistani Brain contained a logic bomb that searched for the names of unauthorized duplicates of programs written by the authors of the virus.
"Worms" spread through networks and replicate themselves but do not affect programs. They were invented in 1980 by two Xerox Corporation researchers to perform useful network chores—such as searching for computer malfunctions or idle computers. Worms disseminate themselves throughout networks. Though considered relatively benign, worms can tie up memory and bring networks to a standstill.

PREVENTING AND RECOVERING FROM
VIRUSES

Many steps can be taken to prevent or recover from virus infections. Having a source of clean (i.e., uninfected by viruses) backup copies for data files and programs is as important as it is elementary. Ideally, alternating sets of backup media should be used to increase the chances of having a clean original. The manufacturer's original diskettes for programs should be kept in a safe place and the write-protect tabs should be set to prevent their erasure in case they are unknowingly installed on an infected system.
Once a system is confirmed to be infected, it should not share disks or communication lines with other computers. Disks that could have perpetuated the virus should not be used unless they are certain to contain only data files and the virus is known not to attack the boot sector. All other disks should be reformatted or destroyed.
The computer itself should be shut down and rebooted with the original operating system disk, and the operating system files should be restored. If application programs have been infected, the hard disk should be reformatted. Data files may be backed up and recopied after the disk has been formatted.
The capacity of both local and wide area networks to share information can be used to unwittingly disseminate viruses. If networks are to be useable, they, like disks, must be secured against viruses, Trojan horses, and unintended information transfer. Most networks employ some means of verifying a user's identity, such as passwords. One creative way hackers have bypassed password access controls is by using spell-checking dictionaries from word processing programs to supply possible passwords. Other sources of passwords include information known about network users. Smart cards have been developed to overcome these weaknesses. With these, a variation on the "call-back" system, hardware at the remote site must confirm that the correct user is calling the system from the correct terminal location. More sophisticated smart cards contain microchips within them that transmit an algorithm recognized by the network server, making their misuse even more difficult.
Within an organization, multi-level password systems can ensure that individuals are granted access only to the information required for their jobs. When correctly implemented, they can prevent Trojan horse routines from using the operating system to help copy confidential information.

OTHER SAFEGUARDS

ENCRYPTION.

Encryption systems are a way to secure information as it travels over phone lines or network cables. However, these usually slow down the network, and the encryption keys must be distributed in a secure way, a daunting task for large networks. For each user, double-key systems provide a public key, available to anyone wanting to communicate with its owner, and a private key, known only to the owner.

FIREWALLS.

The "firewall" is a software protection many corporations began to use in the mid-1990s to secure communications on large public access networks such as the Internet. As with physical fire walls, firewall software is designed to be a buffer between two spaces, in this case, the private and public areas of computers and computer networks. The software attempts to block unauthorized crossovers from public to private space. By the, late 1990s most large companies had deployed some form of firewall protections, but the technology is far from foolproof and is easily misconfigured so it doesn't provide optimal protection.

REDUCING MODEM RISKS.

Security can be particularly weak on computers with dial-up modems used to access network resources outside the corporate network. Often companies spend a great deal of time and resources securing the network itself, yet ignore the holes created by such devices that are linked to the network. Without proper security measures, an attacker can first gain control of the individual computer that has dialed out to another network, and then gain access through the backdoor to the protected corporate network. Consequently, IT security managers must take precautions for all computers that connect to outside networks in this manner.

SPOOFING PROTECTIONS.

An Internet-era liability that companies on the World Wide Web face is spoofing, the practice of replacing a company's legitimate web site with often offensive unauthorized material. This can occur in two key ways: through either a weakness in the domain name server (DNS) security or unauthorized file manipulation on the company's web server that hosts its pages. The DNS risk can be effectively minimized through proper configuration of the server, specifically to block attempts to redirect browser requests for the company's pages to another unaffiliated site. Web server protection is more complicated because vandals may gain access to it by a variety of means, but the general protections are similar to those for any computer network resource. Most companies don't initially foresee or plan for the risk of spoofing, but a few widely publicized incidents, including one involving the New York Times site, have drawn attention to this threat.

ELECTRONIC SURVEILLANCE.

A computer isn't entirely secure even if it is not connected to any networks. Sophisticated electronic surveillance techniques have been known to recover data from the radio emissions generated by CPUs, monitors, peripheral cables, etc. The level of shielding available ranges from FCC Class A (commercial) to Class B (residential) to the federal government's Tempest standard for military contractors.

ELECTRONIC MEDIA DISPOSAL.

A strong potential for abuse also exists with improperly destroyed or recycled media. Shedders can be used to destroy various types of media, particularly paper printouts. A variety of different models are available, each a compromise between price, capacity, speed, and the thoroughness of destruction. Not all shredders can cut into diskettes. Specialized types of shredders include "pulpers" which wet the paper and "disintegrators" which repeatedly cut the documents until their particles fall through a fine screen.
The information stored on magnetic media can be destroyed by overwriting. This is a more involved process than merely "erasing" files from a disk, which merely changes the disk's directory. Overwriting changes each bit of binary information to either I or 0. Precautions must be taken to ensure that all the medium is overwritten, to destroy erased information not currently listed in directories. Even this does not complete the process, however. Just as a faint whisper of previously-recorded material can be audible in audiocassettes that have been reused, so can bits of overwritten information still exist. Bits that remain the same after the overwriting may be recorded at a slightly higher level of saturation than those that do not change; hence, most overwriting methods repeat the process, alternating between I's and 0's each time.
The information on magnetic media can also be destroyed more quickly by degaussing, or driving the media through a strong magnetic field until saturation is reached. Diskettes, tapes, and other formats can be erased in bulk in less time than with overwriting.
Burning is perhaps the most thorough method of destroying information recorded on paper, diskettes, punched cards, and semiconductors. Disadvantages are that the materials cannot be reused and that there is a possibility of data recovery from incomplete burning; i.e., from intact paper ash, for which techniques exist to recover printed information.

PERSONNEL.

The most important aspect of computer security involves personnel. Not only are inside jobs the greatest threat of computer crime, but if personnel are lax, security measures may be improperly and ineffectively implemented. Many security breaches at prominent companies have been precipitated by unsuspecting employees—sometimes corporate officers—divulging seemingly innocent information about their computer systems to the general public or to soon-to-be hackers themselves. Other times viruses are disseminated by ostensibly harmless humorous messages and programs that are forwarded throughout a corporate e-mail system, but behind the scenes they wreak havoc on the computers. Therefore, any computer security program should include efforts to adequately screen and train new employees, and a system of accounting and administrative controls to detect and deter criminal activity should be in place.

HACKER INSURANCE.

A wise investment for any company is to insure its computer systems against various kinds of damage, physical or otherwise. One of the more recent innovations by computer security vendors has been to offer so called hacker insurance as part of a broader security management contract. Once these firms are employed to install and manage a computer security program, they insure against unauthorized outside penetration up to a maximum amount per incident or per year. In some cases the insurance benefit may be paid on the mere basis that an incident occurred, regardless of the damage. Similar insurance policies exist for companies conducting electronic commerce over the Internet to provide protection against fraudulent transactions.
[ Frederick C. Ingram ]

FURTHER READING:

Cree, Mark. "Don't Give Up Network Control for Network Speed." Business Communication Review. April 1999.
Davy, Jo Ann. "Virus Protection: Today's Software Keeps Computers and Networks Healthy." Managing Office Technology, September 1998.
Lawson, Nate, and John Garris. "Plug Your Company's Common Security Holes." PC Magazine, 25 May 1999.
Pipkin, Donald L. Halting the Hacker: A Practical Guide to Computer Security. Upper Saddle River, NJ: Prentice Hall. 1998.
Power, Richard. "1999 CSI/FBI Computer Crime and Security Survey." Computer Security Issues & Trends, winter 1999.

Benefits of VoIP – VOIP Security Series

Benefits of VoIP – VOIP Security Series
VoIP stands for Voice over Internet Protocol and is the routing of voice conversations over the Internet or IP based networks. While using a VoIP system, a single high-speed connection is used for all voice and data communications. From a business perspective, this idea is attractive; however, if not implemented properly, it can be worrisome for the network and security staff alike.
The idea is a merged data and VoIP network will allow for lower overhead, and result in a financial savings to the customer. Generally, the savings are discovered during deployment and maintenance, as many of the technical and human resources are already in place.
VoIP holds the promise of reduced costs and better features. More competition and innovation should result in better services, lower costs, and more features.  VoIP can make access charges and long distance cheaper.
Part of the cost savings is due to use of a single network, reusing the data network for voice, along with other applications. This is partially true, but networks usually require upgrades to support voice. This includes support for QoS and Power over Ethernet (PoE).
Years ago, some voice system maintenance, such as moving handsets/extensions, required wiring changes. This really isn’t true for modern PBXs, but early VoIP was sold as a way to reduce this cost. VoIP promises reductions in cost due to lower maintenance/administration. The idea is that since VoIP is just another data application, it should be easier for IT personnel to maintain. This is true to some degree, since VoIP shares the network with other applications, but the voice application itself must still be managed.
VoIP also promises to make it easier to integrate voice with other forms of communications, including e-mail, instant messaging, etc. The industry has relabeled “VoIP” as “Unified Communications”, which is sort of just a new label for VoIP, since VoIP hasn’t fulfilled many of the promises it had, but also to describe greater integration of VoIP with other applications.
The major voice vendors are all pretty much focused on VoIP, and it is difficult to purchase large systems that are not VoIP oriented, or at least enabled. The vendors are not investing in legacy technology, so if you want their latest technology, you have to invest in VoIP. Vendors such as Cisco, who have a vested interest in moving the voice application to the IP network, have created the VoIP market. VoIP gives vendors a reason to get you to upgrade your systems.
Traditionally, it was difficult to set up TDM-based access to the public network. Buying and setting up equipment was difficult and expensive. VoIP technologies make it easier to set up access and long distance services, thereby creating more options for enterprises and consumers.
VoIP is most attractive due to the cost savings potential for home and enterprise customers alike. By moving the calls to an IP based network (as opposed to traditional circuit switched), calls of any type become less expensive. In some cases, the call can travel the Internet for the majority (if not all) of the call. Again, this is a move from commercial telecommunication systems to packet switched voice.
By leveraging existing WAN connectivity to remote locations over a dedicated data network or the Internet, organizations can avoid incurring long-distance toll-call charges. Instead of using a long-distance provider’s network for voice connectivity between offices, organizations leverage existing packet-switched networks for voice traffic, avoiding the long-distance network altogether.
 Where a single T1 circuit can support a maximum of 24 circuit-switched voice conversations, VoIP traffic compresses the voice stream to better utilize the available bandwidth in packet-switched networks. Some compression algorithms are able to retain common voice quality while reducing the bandwidth requirements from 64 Kbps per call to 6 Kbps per call.
VoIP also becomes interesting from a network management perspective, as all network traffic (data and voice) now use one network. Significant savings can result from only managing one network, as opposed to concurrently maintaining separate voice and data networks. Deploying a VoIP network has many advantages to an organization. The primary driver is typically cost savings of not having to implement a traditional PBX (with separate wiring) and a data network.
Keep in mind that older data networks may need upgrading to support features such as QoS and power over Ethernet (described later). PoE is needed so your phones don’t go down if you have a power failure.

Advanced Security Essentials - Enterprise Defender

Advanced Security Essentials - Enterprise Defender

 

Laptop RequiredFree
Cyber Security Survival Course - Security Enterprise Defender
Cyber security continues to be a critical area for organizations and will continue to increase in importance as attacks become stealthier, have a greater financial impact on an organization, and cause reputational damage. While Security Essentials lays a solid foundation for the security practitioner, there is only so much that can be packed into a six-day course. Security 501 is a follow up to SEC401: SANS Security Essentials (with no overlap) and continues to focus on more technical areas that are needed to protect an organization. The core focus of the course is on:
  • Prevention - configuring a system or network correctly
  • Detection - identifying that a breach has occurred at the system or network level
  • Reaction - responding to an incident and moving to evidence collection/forensics
A key theme is that prevention is ideal, but detection is a must. We need to be able to ensure that we constantly improve our security to prevent as many attacks as possible. This prevention/protection occurs on two fronts - externally and internally. Attacks will continue to pose a threat to an organization as data becomes more portable and networks continue to be porous. Therefore a key focus needs to be on data protection, securing our critical information no matter whether it resides on a server, in a robust network architecture, or on a portable device.
Despite an organization's best effort at preventing attacks and protecting their critical data, some attacks will still be successful. Therefore we need to be able to detect attacks in a timely fashion. This is accomplished by understanding the traffic that is flowing on your networks and looking for indication of an attack. It also includes performing penetration testing and vulnerability analysis against an organization to identify problems and issues before a compromise occurs.
Finally, once an attack is detected we must react to it in a timely fashion and perform forensics. By understanding how the attacker broke in, this can be fed back into more effective and robust preventive and detective measures, completing the security lifecycle.
If you want to be a technology and security leader, this is the course for you!
-Andrew Longsworth, Priscoll's
Author Statement
It is always a thrill after I finish teaching SEC401 to see students leave with a fire in their eyes and an excitement about them. They walked into class feeling overwhelmed that security is a lost cause, but now they leave class understanding what they need to do and have a focus and drive to do the right thing to secure their organizations. However the next question we receive on a constant basis is, what course should I take next? How do I continue my journey? Well, it depends on what your focus area is. Do you want to get more into perimeter protection, IDS, operating system security, etc? The challenge is that many students have positions that do not allow them to focus on one area — they need to understand all of the key areas across security. What students are telling us is that they want a Security Essentials part 2 or a 500-level continuation of Security Essentials covering the next level of technical knowledge. In Security 501, SANS has decided to give students just what they have been asking for, and I am beyond thrilled with the results. We have identified core foundation areas that compliment SEC401 with no overlap and continue to build a solid security foundation for network practitioners.
This is illustrated by one student who after a recent class ran up to me, gave me a big hug (he was a retired football player, so I did not argue), and said, "SANS is awesome. I have been frustrated in my job for over a year and had lost hope that you really could secure an organization and that anything I did made a difference. Just as my light of hope was burning out, I decided to take the Security Essentials course, figuring it was a lost cause. After this class the fire is burning brighter than it ever was. I feel like a kid again and cannot wait to go back to my company and make a difference. However, I think my boss is scared because I called him eight times throughout the week, telling him all of the great information and practical knowledge I learned."
After teaching thousands of students, I am confident you will have similar results and be just as excited. However, just for reference, hugs are optional.
- Eric Cole

 

The basic Internet-based technologies.

The basic Internet-based technologies.


Broadband
"Broadband" is the general term used to refer to high-speed network connections.  In this context, Internet connections via cable modem and Digital Subscriber Line (DSL) are frequently referred to as broadband Internet connections. "Bandwidth" is the term used to describe the relative speed of a network connection -- for example, most current dial-up modems can support a bandwidth of 56 kbps (thousand bits per second). There is no set bandwidth threshold required for a connection to be referred to as "broadband", but it is typical for connections in excess of 1 Megabit per second (Mbps) to be so named.

Cable modem access
A cable modem allows a single computer (or network of computers) to connect to the Internet via the cable TV network. The cable modem usually has an Ethernet LAN (Local Area Network) connection to the computer, and is capable of speeds in excess of 5 Mbps.

Typical speeds tend to be lower than the maximum, however, since cable providers turn entire neighborhoods into LANs which share the same bandwidth.  Because of this "shared-medium" topology, cable modem users may experience somewhat slower network access during periods of peak demand, and may be more susceptible to risks such as packet sniffing and unprotected windows shares than users with other types of connectivity.

DSL access
Digital Subscriber Line (DSL) Internet connectivity, unlike cable modem-based service, provides the user with dedicated bandwidth. However, the maximum bandwidth available to DSL users is usually lower than the maximum cable modem rate because of differences in their respective network technologies. Also, the "dedicated bandwidth" is only dedicated between your home and the DSL provider's central office -- the providers offer little or no guarantee of bandwidth all the way across the Internet.

DSL access is not as susceptible to packet sniffing as cable modem access, but many of the other security risks we'll cover apply to both DSL and cable modem access.

The difference between broadband services and traditional dial-up services
Traditional dial-up Internet services are sometimes referred to as "dial-on-demand" services. That is, your computer only connects to the Internet when it has something to send, such as email or a request to load a web page. Once there is no more data to be sent, or after a certain amount of idle time, the computer disconnects the call. Also, in most cases each call connects to a pool of modems at the ISP, and since the modem IP addresses are dynamically assigned, your computer is usually assigned a different IP address on each call. As a result, it is more difficult (not impossible, just difficult) for an attacker to take advantage of vulnerable network services to take control of your computer.

Broadband services are referred to as "always-on" services because there is no call setup when your computer has something to send. The computer is always on the network, ready to send or receive data through its network interface card (NIC). Since the connection is always up, your computer’s IP address will change less frequently (if at all), thus making it more of a fixed target for attack.

What’s more, many broadband service providers use well-known IP addresses for home users. So while an attacker may not be able to single out your specific computer as belonging to you, they may at least be able to know that your service providers’ broadband customers are within a certain address range, thereby making your computer a more likely target than it might have been otherwise.

The difference between broadband access and the network I use at work

Corporate and government networks are typically protected by many layers of security, ranging from network firewalls to encryption. In addition, they usually have support staff who maintain the security and availability of these network connections.

Although your ISP is responsible for maintaining the services they provide to you, you probably won’t have dedicated staff on hand to manage and operate your home network. You are ultimately responsible for your own computers. As a result, it is up to you to take reasonable precautions to secure your computers from accidental or intentional misuse.

Protocol
A protocol is a well-defined specification that allows computers to communicate across a network. In a way, protocols define the "grammar" that computers can use to "talk" to each other.

IP
IP stands for "Internet Protocol". It can be thought of as the common language of computers on the Internet. There are a number of detailed descriptions of IP given elsewhere, so we won't cover it in detail in this document. However, it is important to know a few things about IP in order to understand how to secure your computer. Here we’ll cover IP addresses, static vs. dynamic addressing, NAT, and TCP and UDP Ports.

IP address
IP addresses are analogous to telephone numbers – when you want to call someone on the telephone, you must first know their telephone number. Similarly, when a computer on the Internet needs to send data to another computer, it must first know its IP address. IP addresses are typically shown as four numbers separated by decimal points, or “dots”. For example, 10.24.254.3 and 192.168.62.231 are IP addresses.
If you need to make a telephone call but you only know the person’s name, you can look them up in the telephone directory (or call directory services) to get their telephone number. On the Internet, that directory is called the Domain Name System, or DNS for short. If you know the name of a server, say www.cert.org, and you type this into your web browser, your computer will then go ask its DNS server what the numeric IP address is that is associated with that name.

Every computer on the Internet has an IP address associated with it that uniquely identifies it. However, that address may change over time, especially if the computer is
  • dialing into an Internet Service Provider (ISP)

  • connected behind a network firewall

  • connected to a broadband service using dynamic IP addressing.


  • Static and dynamic addressing
    Static IP addressing occurs when an ISP permanently assigns one or more IP addresses for each user. These addresses do not change over time. However, if a static address is assigned but not in use, it is effectively wasted. Since ISPs have a limited number of addresses allocated to them, they sometimes need to make more efficient use of their addresses.

    Dynamic IP addressing allows the ISP to efficiently utilize their address space. Using dynamic IP addressing, the IP addresses of individual user computers may change over time. If a dynamic address is not in use, it can be automatically reassigned to another computer as needed.

    NAT
    Network Address Translation (NAT) provides a way to hide the IP addresses of a private network from the Internet while still allowing computers on that network to access the Internet. NAT can be used in many different ways, but one method frequently used by home users is called "masquerading".
    Using NAT masquerading, one or more devices on a LAN can be made to appear as a single IP address to the outside Internet. This allows for multiple computers in a home network to use a single cable modem or DSL connection without requiring the ISP to provide more than one IP address to the user. Using this method, the ISP-assigned IP address can be either static or dynamic. Most network firewalls support NAT masquerading.
     


    TCP and UDP Ports
    TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are both protocols that use IP. Whereas IP allows two computers to talk to each other across the Internet, TCP and UDP allow individual applications (also known as "services") on those computers to talk to each other.
    In the same way that a telephone number or physical mail box might be associated with more than one person, a computer might have multiple applications (e.g. email, file services, web services) running on the same IP  adress

    Ports allow a computer to differentiate services such as email data from web data. A port is simply a number associated with each application that uniquely identifies that service on that computer. Both TCP and UDP use ports to identify services. Some common port numbers are 80 for web (HTTP), 25 for email (SMTP), and 53 for Domain Name System (DNS).


    Firewall
    A firewall is "a system or group of systems that enforces an access control policy between two networks." In the context of home networks, a firewall typically takes one of two forms:

    Software firewall - specialized software running on an individual computer, or
    Network firewall - a dedicated device designed to protect one or more computers.

    Both types of firewall allow the user to define access policies for inbound connections to the computers they are protecting. Many also provide the ability to control what services (ports) the protected computers are able to access on the Internet (outbound access). Most firewalls intended for home use come with pre-configured security policies from which the user chooses, and some allow the user to customize these policies for their specific needs.
     


    Be careful when reading email with attachments

    Be careful when reading email with attachments


    We’ve all heard stories about people receiving an item in the mail that in some way caused them harm. We’ve heard of letter bombs and exploding packages, and in 2001, we learned about Anthrax-laden letters. Although their frequency is low, they do make news.

    These unsolicited items are sent to unsuspecting recipients. They may contain a return address, a provocative envelope, or something else that encourages its receiver to open it.

    You probably receive lots of mail each day, much of it unsolicited and containing unfamiliar but plausible return addresses. Some of this mail tells you of a contest that you may have won or the details of a product that you might like. The sender is trying to encourage you to open the letter, read its contents, and interact with them in some way that is financially beneficial – to them. Even today, many of us open letters to learn what we’ve won or what fantastic deal awaits us. Since there are few consequences, there’s no harm in opening them.

    Email-borne viruses and worms operate much the same way, except there are consequences, sometimes significant ones. Malicious email often contains a return address of someone we know and often has a provocative Subject line.

    Email viruses and worms are fairly common. If you’ve not received one, chances are you will. Here are steps you can use to help you decide what to do with every email message with an attachment that you receive. You should only read a message that passes all of these tests.

    1.The Know test: Is the email from someone that you know?

    2.The Received test: Have you received email from this sender before?

    3.The Expect test: Were you expecting email with an attachment from this sender?

    4.The Sense test: Does email from the sender with the contents as described in the Subject line and the name of the attachment(s) make sense? For example, would you expect the sender – let’s say your Mother – to send you an email message with the Subject line “Here you have, ;o)” that contains a message with attachment – let’s say AnnaKournikova.jpg.vbs? A message like that probably doesn’t make sense. In fact, it happens to be an instance of the Anna Kournikova worm, and reading it can damage your system.

    5.The Virus test: Does this email contain a virus? To determine this, you need to install and use an anti-virus program.

    You should apply these five tests to every piece of email with an attachment that you receive. If any test fails, toss that email. If they all pass, then you still need to exercise care and watch for unexpected results as you read it.

    What is Intrusion Detection?

    What is Intrusion Detection?
    Intrusion detection is the art and science of sensing when a system or network is being used inappropriately or without authorization. An intrusion-detection system (IDS) monitors system and network resources and activities and, using information gathered from these sources, notifies the authorities when it identifies a possible intrusion. 

    ntrusion detection systems can also be categorized as knowledge- or behavior-based. Most commercially available systems are knowledge-based, matching signatures of known attacks against changes in systems or streams of packets on a network. Such systems are reliable and generate few false positives, but they can detect intruders using only attacks they already know about. They're often helpless against new attacks, so they must be continually updated with new knowledge about new attacks.
    A behavior-based IDS instead looks at actions, attempting to identify attacks by monitoring system or network activity and flagging any activity that doesn't seem to fit in. Such activities may trigger an alarm - often a false alarm. Though false positives are common with a behavior-based on IDS, so is the ability to detect a previously unreported attack.

    The keys for firewall protection

    The keys for firewall protection
    Firewall protection primarily uses packet filtering to detect and block intruders. Some also include application filtering. In addition, these applications typically generate alerts and log intrusion attempts.

    Packet Filtering

    In packet filtering, the firewall software inspects the header information (source and destination IP addresses and ports) in each incoming and, in some cases, outgoing, TCP/IP packet. Based on this information, the firewall blocks the packet or transmits it. The firewall uses the port information to block idle or nonstandard ports such as a listening port opened by a Trojan horse. In this way, the firewall blocks packets sent from a hacker to the Trojan horse listening port. Increasingly, personal firewalls also block outgoing traffic on these ports. This precludes a Trojan horse from sending outgoing packets.
    The firewall protection also uses the port information to block certain types of incoming packets associated with common hacker attacks. For example, hackers use port scanner software to identify target computers for attack. Port scanners “ping” ranges of IP addresses via port 7. If a computer responds to the ping, it becomes a target for further probing for open ports. By default, personal firewall software packages block these incoming pings on port 7 so that the computer does not respond.
    Personal firewalls also use the source and destination IP addresses to filter packets. Firewalls can be configured to allow or block packets from specific IP addresses. However, packet filtering is susceptible to “IP spoofing,” which refers to the practice of forging the source IP address in a packet. In this way, a malicious hacker can try to gain entry by spoofing the source IP address. For example, some firewalls will not block a packet if its source and destination IP addresses correspond to IP addresses behind the firewall on the private network. Hackers exploit this vulnerability by forging the source IP address. In another IP spoofing scenario, the source and destination IP addresses are the same; this type of packet will lock up some computers.

    Application Filtering

    As one important function of firewall protection, Application-level filtering uses higher-layer protocol information to filter traffic and implements additional security and access control services. More typical in enterprise networks, application-level firewalls are implemented as hosts running proxy servers. These proxy servers are used to prevent direct traffic between network peers. Additionally, proxy servers can log and audit network traffic. Many personal firewalls have a basic form of application-level filtering that allows users to specify which applications on the computer may access the Internet.
    Some Trojan horse programs may circumvent this filtering by modifying a program that is commonly granted full access to the Internet through a firewall. In this way, the Trojan horse masquerades as a harmless program on the PC, but provides a hacker with access to the PC, in spite of application-level filtering firewalls. Only a personal firewall software package, which also checks programs for unauthorized modifications, can successfully defend a user from this type of attack.

    Alerting and Logging

    A key feature of any firewall is its ability to alert the user when it detects an “attack,” and to maintain a system log of these events. This allows the user to identify threats and to fine tune the firewall configuration appropriately. A key responsibility of the user is to monitor the logs and take appropriate action when necessary. and assigns “private” IP addresses to each client PC on the LAN. These private addresses are not known outside the LAN on the Internet. All incoming packets arriving at the NAT gateway have the same destination address. The NAT gateway refers to its association mapping table to determine the actual client address and port number for a destination packet and forwards the packet to the correct client. Many of these NAT devices also include additional firewall protection in the form of basic packet filtering. Some NAT implementations also include “stateful” port inspection, in which the firewall monitors the state of the transaction to verify that the destination of an inbound packet matches the source of a previous outbound request. Stateful port inspection helps to prevent denial-of-service attacks (which typically use the UDP transport) that can be mounted using IP address spoofing techniques.

    What is firewall software?

    What is firewall software?
    Firewall software, its importance to your home computer strategy, and a way to think about the job you need to do. We’re going to depart from our “computer-is-like-a-house-and-the-things-in-it” analogy to use another that you are probably also familiar with: an office building.

    Have you ever visited a business where you first stopped at the reception desk to interact with a security guard? That guard’s job is to assess everybody who wishes to enter or leave the building to decide if they should continue on or be stopped. The guard keeps the unwanted out and permits only appropriate people and objects to enter and leave the business’s premises.

    Let’s dig deeper into this analogy. When someone enters a building, the security guard usually greets them. If they have an appropriate identification badge, they show it to the guard or swipe it through a reader. If all is OK, they pass through the guard’s checkpoint. However, if something’s wrong or if they are a visitor, they must first stop at the guard desk.

    The guard asks whom they wish to see. The guard may also ask for identification such as a driver’s license or their company ID. The guard reviews the list of expected guests to see if this person is approved to visit the party in question. If the guard decides everything is all right, the visitor may pass. The visitor usually signs a logbook with their name, the company they represent, whom they are seeing, and the time of day.

    On a computer, the firewall software acts much like a guard when it looks at network traffic destined for or received from another computer. The firewall determines if that traffic should continue on to its destination or be stopped. The firewall “guard” is important because it keeps the unwanted out and permits only appropriate traffic to enter and leave the computer.

    To do this job, the firewall software has to look at every piece of information – every packet – that tries to enter or leave a computer. Each packet is labeled with where it came from and where it wants to go. Some packets are allowed to go anywhere (the employee with the ID badge) while others can only go to specific places (visitors for a specific person). If the firewall allows the packet to proceed (being acceptable according to the rules), it moves the packet on its way to the destination. In most cases, the firewall records where the packet came from, where it’s going, and when it was seen. For people entering a building, this is similar to the ID card system keeping track of who enters or the visitor signing the visitor’s log.

    The building’s guard may do a few more tasks before deciding that the person can pass. If the person is a visitor and is not on the visitors list, the guard calls the employee being visited to announce the visitor’s arrival and to ask if they may pass. If the employee accepts the visitor, they may proceed. The guard may also give the visitor a badge that identifies them as a visitor. That badge may limit where in the building they can go and indicate if they need to be escorted. Finally, no matter whether the person is a visitor or an employee, the guard may inspect their briefcase or computer case before they pass.
    The firewall software can also check whether a given packet should pass, allowing the computer’s user to respond to unanticipated network traffic (just as the guard does with the unexpected visitor). Individual packets can be allowed to pass, or the firewall can be changed to allow all future packets of the same type to pass. Finally, firewalls can filter packets based not only on their point of origin or destination, but also on their content (inspecting the briefcase or computer case before being allowed to pass).

    Back to the office building, when employees leave the building, they may also have to swipe their ID card to show that they’ve left. A visitor signs out and returns their temporary badge. Both may be subject to having their possessions inspected before being allowed to leave.

    Firewalls can also recognize and record when a computer-to-computer connection ends. If the connection was temporary (like a visitor), the firewall rules can change to deny future similar connections until the system’s user authorizes them (just as visitors must re-identify themselves and be re-approved by an employee). Finally, outgoing connections can also be filtered according to content (again, similar to inspecting possessions at the exit).

    What does this all mean? It means that with a firewall software, you can control which packets are allowed to enter your home computer and which are allowed to leave. That’s the easy part.

    The hard part is deciding the details about the packets that are allowed to enter and exit your home computer. If your firewall supports content filtering, you also need to learn which content to allow and which not to allow. To help you get a handle on this harder task, let’s return to our security guard analogy.

    Imagine that you are that security guard and it’s your first day on the job. You have to decide who’s allowed in, who’s allowed out, and what people can bring into and take out of the building. How do you do this?

    One strategy is to be very conservative: let no one in or out and let no possessions in or out. This is very simple, very easy to achieve, but not particularly helpful to the business if none of its employees or visitors can get in or out. Nor is it helpful if they can’t bring anything with them. With this type of strategy, your tenure as a security guard may be short-lived.
    If you try this, you quickly learn that you need to change your strategy to allow people in and out only if they have acceptable identification and possessions using some agreed-to criteria. Add the requirement that if you don’t meet the precise criteria for admittance, you don’t get in.

    With firewall software, you can do the same thing. You can program your firewall to let nothing in and nothing out. Period. This is a deny-all firewall strategy and it does work, though it effectively disconnects you from the Internet. It is impractical for most home computers.

    You can do what the security guard did: review each packet (employee or visitor) to see where it’s coming from and where it’s going. Firewall software let you easily review each packet so that you can decide what to do with it. When you are shopping for a firewall, look for this review feature because it can be quite helpful. Practically speaking, it isn’t easy to decide which traffic is all right and which is not all right. Any feature that makes this job easier helps you achieve your goal of securing your home computer.

    Just like the security guard who learns that anybody with a company photo ID is allowed to pass, you too can create firewall rules that allow traffic to pass without reviewing each packet each time. For example, you may choose to allow your Internet browsers to visit any web site. This rule would define the source of that traffic to be your browsers (Netscape Navigator and Microsoft Internet Explorer, for example) and the destination location to be any web server. This means that anybody using your home computer could visit any Internet web site, as long as that web server used the well-known standard locations.

    1. Now that you have an idea of what your firewall security guard is trying to do, you need a method for gathering information and programming your firewall. Here is a set of steps to use to do just that:
    2. The Program test: What’s the program that wants to make a connection to the Internet? Although many programs may need to make the same type of connection to the same Internet destination, you need to know the name of each. Avoid general rules that allow all programs to make a connection. This often results in unwanted and unchecked behavior.
    3. The Location test: What’s the Internet location of the computer system to which your computer wants to connect? Locations consist of an address and a port number. Sometimes a program is allowed to connect to any Internet location, such as a web browser connecting to any web server. Again, you want to limit programs so that they only connect to specific locations where possible.
    4. The Allowed test: Is this connection allowed or denied? Your firewall rules will contain some of each.
    The Temporary test: Is this connection temporary or permanent? For example, if you’re going to connect to this specific location more than five times each time you use the computer, you probably want to make the connection permanent. This means that you ought to add a rule to your firewall rules. If you aren’t going to make this connection often, you should define it as temporary.

    With each connection, apply the PLAT tests to get the information you need to build a firewall rule. The answer to the PLAT tests tells you if you need to include a new firewall rule for this new connection. For firewall, you can temporarily allow a connection but avoid making it permanent by not including it in your rules. Where possible, allow only temporary connections.

    As you run each program on your home computer, you’ll learn how it uses the Internet. Slowly you’ll begin to build the set of rules that define what traffic is allowed into and out of your computer. By only letting in and out what you approve and denying all else, you will strike a practical balance between allowing everything and allowing nothing in or out.
    Along the way, you may come across exceptions to your rules. For example, you might decide that anybody who uses your home computer can visit any web site except a chosen few web sites. This is analogous to the security guard letting every employee pass except a few who need more attention first
     
    To do this with firewall rules, the exception rules must be listed before the general rules. For example, this means that the web sites whose connections are not allowed must be listed before the rules that allow all connections to any web site.

    Why? firewall search its rules starting from the first through the last. When the firewall finds a rule that matches the packet being examined, the firewall honors it, does what the rule says, and looks no further. For example, if the firewall finds the general rule allowing any web site connections first, it honors this rule and doesn’t look further for rules that might deny such a connection. So, the order of firewall rules is important.

    firewall Software is your security guard that stands between your home computer and the Internet. It lets you control which traffic your computer accepts. It also controls which of your programs can connect to the Internet. With a firewall, you define which connections between your computer and other computers on the Internet are allowed and which are denied. There are free firewall products that provide the capabilities you need to secure your home computer. Commercial versions have even more features that can further protect your computer.

    Firewall Software is an important part of your home computer’s security defenses.
    .