Security Issues Introduction.
Security All the connectivity schemes you will hear about have security implications. –4 computer security incidents in 2000 –6 computer security incidents in 2001 Firewall is absolutely crucial. –Continual ‘scans’ –During Code Red - ‘thousands per second’
Security Comes From…. Firewall –only limited protocols allowed in to selected systems. Anti-Virus Software on all vulnerable systems. – scanned on and before Exchange servers. Good system management procedures –Applying patches/fixes –Checking for unexpected changes –Tight security settings Good user practice
Example (1) Nimda virus Spread by: Web browsing Web server worm (‘code red’) Network shares
Example (2) How Microsoft was Hacked Member of staff received infected by e- mail received at home. Home PC infected and passed account details to hackers Hackers have valid username/password to enter Microsoft’s site.
ISDN RAL does have ISDN capability. BT ‘missed the boat’ Fast call set-up and use of demand dial. Provides link to Boulby mine.
Security Considerations for Home PCs Requirement to have both up-to-date anti-virus and a personal firewall. See: Proposed firewall is ZoneAlarm Pro.