Unethical hackers are always looking for weaker points in a network system to hack the security system of your company and get hold of confidential and new information. Some such "black-hat hackers" derive a vicarious pleasure from wreaking havoc on security systems and some hackers do it for money. Whatever may be the reason, malicious hackers are giving nightmares to companies and organisations of almost all sizes. Especially, large corporate houses, banks, financial institutions, security establishments are favourite targets for hackers. However, this menace can be prevented to a great extent if proper security measures are taken at the right time.
- Some such "black-hat hackers" derive a vicarious pleasure from wreaking havoc on security systems and some hackers do it for money. Whatever may be the reason, malicious hackers are giving nightmares to companies and organisations of almost all sizes. Especially, large corporate houses, banks, financial institutions, security establishments are favourite targets for hackers. However, this menace can be prevented to a great extent if proper security measures are taken at the right time.
- Install proper scanning software programs to identify all entry points from the internet into the internal network of the company. These points have the weakest security controls which a hacker can easily target. Identifying these entry points, however is not at all an easy task. It is better to take the help of skilled ethical hackers who have taken special network security training to perform this task successfully.
- By running the attack and penetration tests, you can identify those vulnerable points in the network that can be easily accessed from both external and internal users. After identifying these points, you would be able to thwart attacks from external sources and correct the pitfalls that could become the entry points for intruders to hack into your network. The test must be done from both the internal as well as external perspectives to detect all the vulnerable points.
- All possible steps must be taken to make all the users of the network aware of the pitfalls of security and the necessary security practices to minimise these risks. You can conduct the social-engineering tests to determine the user awareness. Until all the users are aware of certain factors related to the network, protection cannot be carried out in the true sense of the term.
- A firewall if not configured properly can act like an open door for any intruder. Hence it is vitally important to set the rules to allow traffic through the firewall that is important to the business. A firewall must have its own configurations depending upon the security aspect of your organization. From time to time proper analysis of the composition and nature of the traffic itself is also necessary to maintain security.
- Use strong password policies by having passwords of seven characters which are of secure length and relatively easy to remember. Passwords must be changed in every 60 days. The password should also be made up of both alpha and numeric characters to make it more unique.
- Since the comments used in source code contain both usernames and passwords, they must also be removed to make the network safe from attackers. All the comments in source code that look inaccessible to external users should also be removed as there are some techniques with the help of which a hacker can even view the source code of nearly all web applications.
- Many default, test and example pages are the most targeted pages for a hacker through which the entire network can be hacked. These pages can give an insight into the design of the network system and the vulnerabilities associated with them. Hence it is advisable to remove such pages from the network.
- The services that are either disabled or removed from the system cannot be used by any hacker to extract information related to the network. Hence, such services must be disabled or removed when not in use.
- Both intrusion detection systems and anti-virus software must be updated regularly and if possible on a daily basis. The updated version of anti-virus software is necessary as it helps in detecting even the latest virus.
- Apart from ensuring the internal security of the network, you need to think about the physical security of your organization. Until and unless your organization has full security, any intruder can simply walk in your office premises to gain whatever information he wants. Hence with technical security, you must also ensure that the physical security mechanisms of your organization are fully functional and effective.
Source: ehow.com
0 comments :
Post a Comment