Posts

Showing posts from September, 2020

Secure Network Architecture Design and the CISSP

Physical Security You might not chart physical security on a technical diagram, but physical security policy needs to be as specific as possible and communicated broadly – especially when the policy changes. Organizations should set terms for accessing physical assets (stationary like servers or mobile like cell phones and tablets). Policy documents should be tailored to those employees that have a need to access the hardware. Non-eligible employees should be alerted by emphasizing consequences for non-compliance. Technologies that enhance physical security include RFID cards, premium locks, fingerprint reading devices, PIN pads and retinal scanners. Management may need to be advised that the company should not skimp on purchasing quality devices to enhance physical security. Not to be overlooked: Any physical protection guarding sensitive areas around servers that hold critical business data. If servers are off-site, the facility should provide documents containing their most recent s

4 Steps to Improve Your Network Infrastructure Monitoring

  There are three major reasons for network monitoring: security threats, performance, and maintenance. The number and types of malware and network attacks continues to increase, and there’s no reason to think it will ever stop. Users expect high performance from applications and have little tolerance of network bottlenecks. Monitoring also provides status about the health of network devices, allowing preventative or just-in-time maintenance that minimizes impact. Make Monitoring Easier You can make monitoring easier and minimize the number of tools you need to use by: 1.Understanding your current network architecture. It’s impossible to monitor effectively if you don’t understand your network design. You should have inventory lists and network diagrams for both physical and virtual links. 2.Understanding your reasons for monitoring. Everything can be monitored, but everything doesn’t need to be monitored. You may want to focus on collecting data about the health and performance of the

Transformation on networks

  Digital transformation has increased the importance of the network, particularly the edge, where customers, employees, cloud applications and IoT devices connect to the enterprise. The legacy static and non-differentiated network edge of years past is no longer sufficient for many reasons, so as companies embark on digital-transformation plans, their networks must evolve. Networking pros should be looking at, among other things, improving security and embracing software-defined networking (SDN) that supports propagating changes quickly across the network in order to accommodate the many challenges digital transformation creates. The internet of things (IoT) has moved out of the operational-technology shadows and has become a core component of most businesses’ digital-transformation strategies. As IoT adoption increases, so will the number of connected endpoints. Almost all of these devices connect at the network edge, so problems at the edge could significantly impair IoT application

proactive LAN management

  Local area networks (LAN and Wi-Fi) are decisive factors in the ups and downs of IT performance, alongside the computer center. But running the LAN infrastructure requires considerable staff and financial resources. T-Systems takes over this task on request and guarantees success with its SLA (service level agreement). This arrangement gives companies security and facilitates a high-performing company network IT employees can breathe a sigh of relief. With managed LAN services, T-Systems takes over all tasks around the active components of the company network. T-Systems configures ports and Wi-Fi access points. As well as this, the managed service contractor provides the necessary hard- and software, including IT services. Services like proactive monitoring and technical reporting are of course also included in the agreed all-round and care-free SLA service. Cloud services are also growing in significance. T-Systems has recognized this and offers a network solution controlled complet

LM authentication protocol

  The LM authentication protocol, also known as LAN Manager and LANMAN, was invented by IBM and used extensively by Microsoft operating systems prior to NT 4.0. It uses a password encrypting technology that is now considered insecure. LM works by creating a "hash" of your password, as follows: Breaking the password into seven-character chunks: If the password length is not a multiple of seven (i.e., 7, 14, 21, 28...), LM pads the remainder of each chunk with zeroes to make it a full seven bytes long. For example, a ten-letter-long password would be divided into a seven-character-long chunk and a three-character-long one, and the smaller one would have zeroes added to it to push it up to seven characters. Mapping all lowercase letters into uppercase: For example, Dog becomes DOG. Encrypting each chunk: LM uses each chunk as a 56-bit DES (a standardized cipher standard) key to encrypt the following string: KGS!@#$%. Concatenating those strings (i.e., linking them end-to-end). R

Types of Network Software

  Network software, which operates over a network rather than on an individual computer, may perform tasks that supplement, enable or replace end-user software. Network-based antivirus software supplements desktop antivirus software. Network messaging server software enables end-user computers to send instant messages back and forth. And server application software, such as Customer Relationship Management software, replaces end-user contact management software. All network software shares the common goal of increasing productivity and improving security for network users. Although computer networks began to emerge in the 1970s, network-based software did not begin to spread widely until personal computers became commonplace in home and office settings in the late 1980s and early 1990s. However, the advent of the visual browser for the Internet in the mid 1990s marked the true turning point for network software because it effectively changed the definition of network from a tool useful

Windows 10 Boot Manager

  Accessing Windows 10 Boot Manager If you have trouble accessing the Boot Manager during your computer's startup process, you can access the Windows 10 Boot Manager through your Settings menu after your computer loads your default Windows installation. To do this, click the gear for "Settings" inside your Start menu, then click "Update & Security" in the window that appears. In the menu on the left side of the window, click "Recovery," then under the "Advanced Startup" heading click "Restart Now." Your computer will restart and give you access to the Boot Manager. Boot Manager on Windows 8.1 You can also access Windows Boot Manager directly through your Windows 8.1 install by following roughly the same procedure. From your Start menu, open "Settings," then click "Change PC Settings." Open the "General" settings menu, then click "Restart Now" under the "Advanced Startup" heading.

threats are associated with network infrastructure devices

  Network infrastructure devices are often easy targets for attackers. Once installed, many network devices are not maintained at the same security level as general-purpose desktops and servers. The following factors can also contribute to the vulnerability of network devices: Few network devices—especially small office/home office and residential-class routers—run antivirus, integrity-maintenance, and other security tools that help protect general-purpose hosts. Manufacturers build and distribute these network devices with exploitable services, which are enabled for ease of installation, operation, and maintenance. Owners and operators of network devices often do not change vendor default settings, harden them for operations, or perform regular patching. Internet service providers may not replace equipment on a customer’s property once the equipment is no longer supported by the manufacturer or vendor. Owners and operators often overlook network devices when they investigate, look for

What are the Biggest Mobile Security Risks

  You can’t abolish your biggest mobile security risk, because it’s the people who use the mobile devices. Human nature can cause many problems: Too trusting People fall for flattery, people fall for requests for help, people fall for claimed social connections, people fall for all kinds of insincere requests, including phishing messages. This behavior isn’t limited to mobile devices, but the social nature of the devices combined with small screens make it harder to check out the bonafides of messages. As a result, users are more likely to respond to phishing messages and accidentally reveal account ids, passwords, and other sensitive data. Too scatterbrained Desktop PCs stay on the desk. Mobile devices travel with their owners, until they don’t: careless or rushed travelers can easily leave mobile devices behind in the cab, restaurant, or wherever they were being used. Once the mobile device is lost, all of the data stored on it is at risk. Too lazy Safe computing requires using stron

LM authentication protocol working

  The LM authentication protocol, also known as LAN Manager and LANMAN, was invented by IBM and used extensively by Microsoft operating systems prior to NT 4.0. It uses a password encrypting technology that is now considered insecure. LM works by creating a "hash" of your password, as follows: Breaking the password into seven-character chunks: If the password length is not a multiple of seven (i.e., 7, 14, 21, 28...), LM pads the remainder of each chunk with zeroes to make it a full seven bytes long. For example, a ten-letter-long password would be divided into a seven-character-long chunk and a three-character-long one, and the smaller one would have zeroes added to it to push it up to seven characters. Mapping all lowercase letters into uppercase: For example, Dog becomes DOG. Encrypting each chunk: LM uses each chunk as a 56-bit DES (a standardized cipher standard) key to encrypt the following string: KGS!@#$%. Concatenating those strings (i.e., linking them end-to-end). R

Layers of Network Communications

  The OSI model is used to define the functions of networking hardware/software, regardless of equipment, vendor or application. The OSI model is a stack of seven layers. Layers one through three are known as the media layers. They define hardware orientation such as routing, switching and cable specifications. Layers four through seven are known as the host layers. They define software that implements network services. Each of the OSI layers has a broad set of protocols and standards. It is important for techs to know and understand the inner workings of these layers if they are to be serious about working with, and troubleshooting networks, the equipment and services on those networks. Let us take a brief look at the seven layers of the OSI model: 7. Application Layer – This is how the user accesses data on the network via items such as email, FTP file transfer and databases. (Example: One computer requests information from another computer over the Internet using Hypertext Transfer

Microsoft Office Picture Manager

  Microsoft Office Picture Manager manages and edits digital pictures. This program includes "Hue and saturation" settings that allow you to adjust the color on a scale. Click and drag the slider on the "Amount" or "Hue" scale for a custom look. Saving this edited file as a separate copy from the original keeps the original file intact for reference. Step 1 Open the saved picture file in "Microsoft Office Picture Manager." Step 2 Click on "Edit Pictures" on the Formatting toolbar. Step 3 Click on "Color" in the "Edit Pictures" pane to the right of the picture. This pane includes "Hue and saturation settings." Step 4 Click on the "Hue and saturation settings," such as "Amount" or "Hue." Click on the slider to achieve the desired effect. You can also enter a value in the settings text box. Step 5 Save this file as a copy with a file name different from the original file. Click on

WHAT IS THE USE OF SECURITY AWARENESS

  The National Cyber Security Centre has stated that cyber attacks, unfortunately, are on the rise. While this alone is an astonishing thought, to make matters worse, it is thought that approximately 31% of businesses do not have any experience in security awareness training nor have any plans to implement cybersecurity precautions. When beginning research into cybersecurity, many are surprised at the number of different types of attacks that can occur; no longer is it merely a case of a computer hack. The most common forms of cyber attacks on businesses are phishing, viruses and ransomware; however, there are tonnes of additional risks such as malware, credential reuse and denial-of-service. For more information on the types of cybersecurity attacks, take a look at Rapid7. Once you have familiarised yourself with the types of security risks your business faces, it is time to implement processes in which you aim to keep the risk of an attack at a minimum. All members of the team, no ma

Components of a LAN Network

  The components used to establish a local area network (LAN) have a variety of functions. The common unifying theme among them is that they facilitate communication between two or more computers. LAN components are configurable in a variety of ways, but a LAN always requires the same basic components. Network Cards At the most basic level, a network card is a component that allows the computer to communicate across a network. This component is frequently built into the motherboard of today's computers, but it can also be a separate card for use in a PCI slot, or part of an external unit that connects to the computer via a USB port. Network cards are further categorized according to whether they operate on wired or wireless networks. However, some cards do support both wireless and wired networking. Network Cables Network cables are the physical lines used to carry information between computers in a wired LAN. The cables are labeled by their category and are commonly referred to as

What is the importance of network infrastructure devices

  Network infrastructure devices are often easy targets for attackers. Once installed, many network devices are not maintained at the same security level as general-purpose desktops and servers. The following factors can also contribute to the vulnerability of network devices: Few network devices—especially small office/home office and residential-class routers—run antivirus, integrity-maintenance, and other security tools that help protect general-purpose hosts. Manufacturers build and distribute these network devices with exploitable services, which are enabled for ease of installation, operation, and maintenance. Owners and operators of network devices often do not change vendor default settings, harden them for operations, or perform regular patching. Internet service providers may not replace equipment on a customer’s property once the equipment is no longer supported by the manufacturer or vendor. Owners and operators often overlook network devices when they investigate, look for

What is the difference between Ethernet and LAN

Technology terminology can becoming overwhelming. With complicated acronyms, proprietary names for generic technology and the sheer pace of innovation, keeping up can be tough. The language of networking is no exception. The array of terms can make even simple concepts seem complex. Understanding the difference between LAN and Ethernet is one of the first steps in separating out all the computer-speak. Definitions A local-area network, or LAN, is a network that works over a small distance, typically within one building or campus. Ethernet is a type of networking protocol used on a LAN. History Originally, networks allowed computers to communicate with each other over short distances. LANs ran on protocols such as Arcnet and Token Ring. Ethernet was developed as a more-efficient protocol to use in a LAN. Features Sending data across a wire to another computer over a LAN requires that the computer send electronic signals through a network interface onto a wire. The si

What is the use of proactive LAN management

Local area networks (LAN and Wi-Fi) are decisive factors in the ups and downs of IT performance, alongside the computer center. But running the LAN infrastructure requires considerable staff and financial resources. T-Systems takes over this task on request and guarantees success with its SLA (service level agreement). This arrangement gives companies security and facilitates a high-performing company network IT employees can breathe a sigh of relief. With managed LAN services, T-Systems takes over all tasks around the active components of the company network. T-Systems configures ports and Wi-Fi access points. As well as this, the managed service contractor provides the necessary hard- and software, including IT services. Services like proactive monitoring and technical reporting are of course also included in the agreed all-round and care-free SLA service. Cloud services are also growing in significance. T-Systems has recognized this and offers a network solution controlled

uses of network infrastructure devices

Network infrastructure devices are often easy targets for attackers. Once installed, many network devices are not maintained at the same security level as general-purpose desktops and servers. The following factors can also contribute to the vulnerability of network devices: Few network devices—especially small office/home office and residential-class routers—run antivirus, integrity-maintenance, and other security tools that help protect general-purpose hosts. Manufacturers build and distribute these network devices with exploitable services, which are enabled for ease of installation, operation, and maintenance. Owners and operators of network devices often do not change vendor default settings, harden them for operations, or perform regular patching. Internet service providers may not replace equipment on a customer’s property once the equipment is no longer supported by the manufacturer or vendor. Owners and operators often overlook network devices when they inves

LM authentication protocol

The LM authentication protocol, also known as LAN Manager and LANMAN, was invented by IBM and used extensively by Microsoft operating systems prior to NT 4.0. It uses a password encrypting technology that is now considered insecure. LM works by creating a "hash" of your password, as follows: Breaking the password into seven-character chunks: If the password length is not a multiple of seven (i.e., 7, 14, 21, 28...), LM pads the remainder of each chunk with zeroes to make it a full seven bytes long. For example, a ten-letter-long password would be divided into a seven-character-long chunk and a three-character-long one, and the smaller one would have zeroes added to it to push it up to seven characters. Mapping all lowercase letters into uppercase: For example, Dog becomes DOG. Encrypting each chunk: LM uses each chunk as a 56-bit DES (a standardized cipher standard) key to encrypt the following string: KGS!@#$%. Concatenating those strings (i.e., linking th

Windows 10 Boot Manager

If you have trouble accessing the Boot Manager during your computer's startup process, you can access the Windows 10 Boot Manager through your Settings menu after your computer loads your default Windows installation. To do this, click the gear for "Settings" inside your Start menu, then click "Update & Security" in the window that appears. In the menu on the left side of the window, click "Recovery," then under the "Advanced Startup" heading click "Restart Now." Your computer will restart and give you access to the Boot Manager. Boot Manager on Windows 8.1 You can also access Windows Boot Manager directly through your Windows 8.1 install by following roughly the same procedure. From your Start menu, open "Settings," then click "Change PC Settings." Open the "General" settings menu, then click "Restart Now" under the "Advanced Startup" heading. In the menu that appea

HOW SECURITY AWARENESS WORKS

The National Cyber Security Centre has stated that cyber attacks, unfortunately, are on the rise. While this alone is an astonishing thought, to make matters worse, it is thought that approximately 31% of businesses do not have any experience in security awareness training nor have any plans to implement cybersecurity precautions. When beginning research into cybersecurity, many are surprised at the number of different types of attacks that can occur; no longer is it merely a case of a computer hack. The most common forms of cyber attacks on businesses are phishing, viruses and ransomware; however, there are tonnes of additional risks such as malware, credential reuse and denial-of-service. For more information on the types of cybersecurity attacks, take a look at Rapid7. Once you have familiarised yourself with the types of security risks your business faces, it is time to implement processes in which you aim to keep the risk of an attack at a minimum. All members of the