The enemy within: firewalls and backdoors
Can your security infrastructure protect you when you've left the key under the mat?
As a modern IT professional you've done all the right things to keep the "bad guys" out: you protected your network with firewalls and/or proxies, deployed anti-virus software across all platforms, and secured your mobile workstations with personal firewalls. You may even be in the process of designing and deploying an enterprise-wide network and host intrusion detection framework to help keep an even closer eye on what's going on. Even with all this, are you really safe? Can your multiple-lines of defense truly protect your network from modern methods of intrusion?
This article presents an overview of modern backdoor techniques, discusses how they can be used to bypass the security infrastructure that exists in most network deployments and issues a wake-up call for those relying on current technologies to safeguard their systems/networks.
[ Read more ]
- Review: SonicWALL Pro (9 June 2003)
- Article: Interview with Lisa Yeo, author of "Personal Firewalls for Administrators and Remote Users" (30 March 2003)
- Review: Personal Firewalls for Administrators and Remote Users (13 March 2003)
- Article: Interview with Aviel Rubin, Computer Science Professor at Johns Hopkins University and Technical Director of the JHU Information Security Institute (26 February 2003)
- Review: Firewalls and Internet Security: Repelling the Wily Hacker 2/e (30 January 2003)
- Review: Cisco Secure PIX Firewalls (28 January 2003)