Thursday, 24 August 2017 17:31

IT Defense In Depth Part 1

Written by
Rate this item
(1 Vote)

In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications at those places, you can rebuff any attack. The problem is, you can’t map every possible avenue for attack.

What does this have to do with IT security? Today many business owners install an antivirus program as their Maginot Line and call it a day. However there are many ways to get into a network that circumvent antivirus software.

Hackers are creating viruses faster than antivirus programs can recognise them (about 100,000 new virus types are released daily), and professional cybercriminals will often test their creations against all commercially available platforms before releasing them onto the net.

Even if you had a perfect anti­virus program that could detect and stop every single threat, there are many attacks that circumvent anti­virus programs entirely. For example, if a hacker can get an employee to click on a compromised email or website, or “brute force guess” a weak password, all the antivirus software in the world won’t help you.

There are several vulnerabilities a hacker can target: the physical layer, the human layer, the network layer, and the mobile layer. You need a defense plan that will allow you to quickly notice and respond to breaches at each level.

The physical layer refers to the computers and devices that you have in your office. This is the easiest layer to defend, but is exploited surprisingly often.

Here are a few examples:

  • Last year 60% of California businesses reported a stolen smartphone and 43% reported losing a tablet with sensitive information.
  • The breaches perpetrated by Chelsea Manning and Edward Snowden occurred because they were able to access devices with sensitive information.
  • For example, Comptia left 200 USB devices in front of various public spaces across the country to see if people would pick a strange device and insert into their work or personal computers. 17% fell for it.

For the physical layer, you need to:

  • Keep all computers and devices under the supervision of an employee or locked away at all times.
  • Only let authorized employees use your devices
  • Do not plug in any unknown USB devices.
  • Destroy obsolete hard drives before throwing them out

Next time in Part II, we will talk about the human and network layers of security.

Read 18816 times Last modified on Thursday, 24 August 2017 17:46
Jordon Darling - CISSP

Jordon is the President/CEO of  HITECH. He is a business minded security professional who has a passion for people and small business.  Some of his certifications include: CISSP, CSSA, MCPS, MCNPS, MS, SA

1711 comments

  • Comment Link Florencia Monday, 19 August 2019 22:33 posted by Florencia

    ultimately plastic [url=http://christianlouboutinoutletus.us/]over the counter viagra cvs[/url] somewhere active
    fair reason otc ed walmart super hand

  • Comment Link daiverdei Monday, 19 August 2019 22:12 posted by daiverdei

    denver broncos 58 von miller gray mens stitched nfl limited gridiron gray jersey billig nike hypervenom phelon iii r酶d and hvit sko billig alle gr氓 new air jordan horizon (gs)
    daiverdei http://www.daiverdei.com/

  • Comment Link pavincia Monday, 19 August 2019 22:11 posted by pavincia

    miami dolphins bobble hats 45 55 limited chris myers houston texans mens jersey nfl alternate red
    pavincia http://www.pavincia.com/

  • Comment Link pipelleh Monday, 19 August 2019 18:59 posted by pipelleh

    nike mercurial superfly 4 aliexpress test nike indianapolis colts denver broncos 18 peyton manning orange blue two tone kids jersey how to knit a baby hat with round loom reviews adidas predator 18+ fg red white shoes nike hypervenom phantom ii black for cheap game david bruton womens jersey denver broncos 30 road white nfl
    pipelleh http://www.pipelleh.com/

  • Comment Link Elva Monday, 19 August 2019 17:03 posted by Elva

    Keep on writing, great job!

  • Comment Link filslan Monday, 19 August 2019 16:17 posted by filslan

    the hundreds hats coffee tutti bianca nike kyrie s1hybrid uk scarpe nike air max thea blue and red jordan 14 low nike rams 16 jared goff royal alternate mens stitched nfl elite jersey billig nike free 4.0 v2 electric green
    filslan

  • Comment Link cnmmhouse Monday, 19 August 2019 15:30 posted by cnmmhouse

    san antonio spurs 21 tim duncan gray swingman jersey billig new air jordan 29 gris blanc chaussures jaguars 24 t.j. yeldon teal green team color mens stitched nfl limited tank top jersey billig adidas eqt blanc and violet air jordan 10 hvid and bl氓 nike lebron soldier 9 ix hvit and r酶d
    cnmmhouse http://www.cnmmhouse.com/

  • Comment Link Cory Monday, 19 August 2019 14:42 posted by Cory

    Right away I am going away to do my breakfast, after having my breakfast
    coming again to read additional news.

  • Comment Link hotelneul Monday, 19 August 2019 14:26 posted by hotelneul

    nike air vapormax 97 mens all red shoes
    hotelneul

  • Comment Link Terrell Monday, 19 August 2019 14:21 posted by Terrell

    When I initially commented I clicked the "Notify me when new comments are added" checkbox and now
    each time a comment is added I get three emails
    with the same comment. Is there any way you can remove me from that service?
    Thanks a lot!

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.