Network Security guide for the home or small business network – Part 6 – Secure your services



This one is going to be tougher. Of what we’ve looked at so far this will probably take more work and learning than any of the others. The good news is, depending on your situation you may need to do less here. IF you have decided that your pc (or network) has ports open to the outside world, so that incoming connections can be listened for. You NEED to do this. For every service that is accessible from the outside world…


it needs to get an even higher priority for the security updates that we talked about last time. Beyond that, if it’s accessible from the outside world you need to do some soul-searching. Why is it accessible from the outside? Who is to have access to it? and How can we make it as secure as possible?

If it’s a web server… maybe you’re trying to do a small demo web site off a machine. That’s fine and good, but is the web server accepting connections from locations other than those that need to? Maybe the demo should be password protected. Maybe certain network addresses need to be denied access outright? Maybe, we need to evaluate exactly what data is shown? Are the folders in the webserver browsable? Should they be?

Another example is a ssh server (secure shell) for remote access on linux systems. Does your configuration allow remote root login with the appropriate password? Does it use both SSH 1 and 2 protocols or just 2? Does it restrict logins to any specific network or networks? Specific users? How can it be tightened down?

Of course, the real starting point has to be – do I need to run this service to the outside world? The default mindset should be no and you should have to justify WHY it should be available. Then, ok I can make it available in the narrowest way possible. Broader access if that can be justified. The other thing to consider is – are there better (more secure) ways to acheive the goal of an open service to the outside world? The bottom line is how can we open up the least access to the outside world to achieve what we need to do.

This is the part where you have to learn a bit about what services listen for connections from the outside world and how to 1) do it differently or 2) make them more secure.

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security guide for the home or small business network - preface OK, this is an ambitious idea, but the two articles on Titan Rain and the lack of IT security training has planted a bug under the saddle so to speak.... I don't know how many parts will be in this series. In fact, I may add to it from time......
  • Network Security guide for the home or small business network - Part 10 - use good passwords In a small, trusted network you might be able to get away with weak passwords for file sharing for instance. What's a weak password? Anything you might find in a dictionary. Most people don't realize this, but there are programs designed to crack passwords. They're designed to take a dictionary......
  • Network Security - Arp spoofing series I think I've wrapped up the series on arp spoofing and it's implications for network security. I know there's nothing earth shattering here, most network security types are well aware of the problems (and perhaps aware of more sophisticated solutions?). For some though, this series is likely an eye opener......
Blog Traffic Exchange Related Websites
  • Lorex Security Solutions LOREX is a global leader in video security camera solutions offering exceptional performance with a wide range of products including security cameras, wireless security cameras, ip cameras (network security cameras), security dvrs, observation systems and other complete security systems. LOREX solutions are easy to setup and features plug and......
  • Effecting mental change Experience makes us see an enormous difference between piety and goodness. Blaise Pascal (1623-1662) An open mind is a prerequisite to an open heart. -Robert M. Sapolsky, neuroscientist and author (1957- ) It might be a good idea if the various countries of the world would occasionally swap history books,......
  • 3 Essential Tools For Your Internet Home Based Business Part of the reason why so many people fail online in their home based business is because they fall into information overload. Save yourself lots of headaches by focusing on these three tools. Hosting/Domain Autoresponder Blog Domain name and Hosting For Your Home based business. Many times you can host......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site