Interview with Andrew G. Mason, author of "Cisco Secure Virtual Private Networks"
by Mirko Zorz - Monday, 21 April 2003.
Andrew G. Mason, CCIE #7144, CCDP, CSS-1, is the CEO of three UK-based companies: Mason Technologies, (resource site for Cisco Certification), and Boxing Orange.

Andrew has 11 years experience in the networking industry and is currently consulting for the largest ISP in the UK. He is involved in the design and implementation of complex secure hosted solutions utilizing products from the Cisco Secure family. Andrew also holds CCSA, A+, Network+, CNA, and MCSE+Internet certifications.

How did you gain interest in computer security?

My interest in computer security is really an evolution that occurred with my career. I started off like many, working on a helpdesk fixing desktop type problems and heavily investing my time studying Microsoft products. I then made the move to Cisco when I was looking for a deeper challenge and the job I was involved in luckily was doing a Token Ring to Ethernet migration for a large UK bank. I quickly became interested and focussed on Internet technologies and I guess that security just came hand in hand with that. I have been involved with Firewalls and Intrusion Detection devices for quite a while and luckily I have had first hand experience of the growth of these products working for the largest European ISP. One thing that I like about the security marketplace is that it is constantly changing. No sooner do you learn one technology, another one becomes prominent.

What are your favourite security tools?

I have quite a few security tools that I use on a daily basis. Nmap and Cain & Able are superb tools for testing your security policy and configurations. I also use the products from Sam Spade for network information. Ethereal gives me everything I need from a network analyser.

What operating system(s) do you use and why?

I must admit that I am a power user of Windows XP, due mainly to the fact that all of the applications I use on a daily basis are Windows based. I also use Linux and Solaris for other tools that are not yet ported to the Windows environment.

How long did it take you to complete "Cisco Secure Virtual Private Networks (CSVPN)" and what was it like?

CSVPN was my forth book that I have been involved with and my second for Cisco Press. The CSVPN book was a pleasure to write and I really enjoyed the research that went with the book. It took my approximately six months to complete the chapters and then about another three months in development before it hit the shelves.

In your opinion, what are the most important things an administrator has to do in order to keep a network secure?

Now this is a question! Security is no longer a single product solution. You cannot just install a firewall and presume that your network is secure. What about internal threats? What about DoS attacks? The most important aspect of network security is the term "defence in depth". You have to look at every aspect of your computer network, starting with a written security policy and identify the risks that exist within the network. There are numerous products that can be mapped to each risk and these have to be implemented synonymously in order to fully protect your network. I also come across a lot of companies with security equipment that is installed and configured very badly. Security is a specialised area that really does require expert assistance in order to configure it to work safely and securely.

What is, in your opinion, the biggest challenge in protecting information at the enterprise level?


Banks and IT security: The elements of success

Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Mar 27th