Solved

Network Security

Posted on 2008-10-21
4
203 Views
Last Modified: 2013-12-04
I resently had a Network Admin leave the company. I wanted to know what is the best way to check our Network Security to make sure there are not backdoors open for him to access our network.  Are there any tools I can use to check our external access to our LAN?

Thank you,
0
Comment
Question by:KappaMan1911
  • 2
4 Comments
 
LVL 18

Expert Comment

by:Rartemass
ID: 22772183
0
 

Author Comment

by:KappaMan1911
ID: 22772304
I have Wire Shark, but I have never really learned who to use it.  I will check out all of your surgestions.  I was told it is not a good idea to leave wireshark on a server.  thanks.
0
 
LVL 4

Accepted Solution

by:
larsga earned 500 total points
ID: 22772397
"We let the janitor go, how can we be certain that he can't get into the apartment block again?" Apologies for sounding facetious, but that's more or less the physical analogy of your question. Without knowing more about the network and what you want to protect, I can only give some general advice.

You could do the following (listed in increasing level of paranoia):

- Change locks on doors and windows.
In other words, disable accounts or change passwords on equipment/systems/accounts he had access to. Ranging from Windows user accounts to administration passwords on network gear. If you have VPN set up (access to your network from remote offices / home / people travelling with laptops), change the VPN passwords.

- Check if any windows are left ajar.
The most obvious thing to check would be the configuration on the firewall(s)/router(s) that face the Internet. You could use 'nmap' or a similar portscanner on the external IP address of the Internet firewall to see of he left an open port (although the output from a portscan wouldn't tell you much unless you know something about networking).

- Look for any hidden windows in the attic or floor-boards that are loose.
If he is competent and really wanted to hide a backdoor, there is really no way you can be absolutely sure without a total cleaning and reinstalling everything. For example, he could have left a small router on the network that is set up to be accessible from dial-up/ISDN/cell-phone; or perhaps a small program on a PC that would connect to him at 1:00AM every second saturday.
0
 

Author Comment

by:KappaMan1911
ID: 22772549
He was a new Network Admin... So I did not give him the keys to the kingdom.  He had not access to the Firewalls, routers., or VPN, and I have changed all those passwords.  Your point is well taken.  Moving forward I will strenghen my network monitoring and security.  Thank you for the advice.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question