Cyber Security

664

Solutions

960

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Share tech news, updates, or what's on your mind.

Sign up to Post

A summary of two approaches to help with discussions with stakeholders to a fruitful outcome - keeping assets secure beyond just being compliant in this evolving threat landscape.
1
I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable.

BACKGROUND

SonicOS separates Service Objects into three different views or groupings: “All Services”, “Custom Services” & “Default Services”. Within each view there are two sections called “Service Groups” & “Services”. Service Groups are simply just Services grouped together for related purposes. Default Services are a list of system-created, commonly used, services that you can utilize to create many different networking policies and rules. They are not only created for convenience but they also play a key role in how default Access Rules function, which I’ll discuss later. For all intents and purposes Default Services Objects and Default Services are synonymous here and I’ll be focusing this discussion on the “Ping” Service Group within Default Services. Ping is just an example, but this bug occurs when renaming any Default Service Object.
Image showing Default Services.Some customers of SonicWALL security appliances will rename Default Services under the Service Groups section like Ping and rename it to “Ping Group” or “Group: Ping”, etc. to denote that it is in fact a group, which actually includes both Ping 0 (ICMP - reply) and Ping 8 (ICMP - request) rather than a single Service Object, e.g. Ping 8 (ICMP - request).

When …
3
LVL 32

Author Comment

by:Blue Street Tech
New update: SonicWALL just got back to me and is handling this based on the amount of affected user reports. It missed the 5.9 release but is schedule to be included for the subsequent release.
0
LVL 2

Expert Comment

by:Peter Wilson
Very helpful. Thank you!
1
12 Steps to a more secure Internet experience

Everyone who is a licensed driver initially had to pass a driving test that consisted of taking:

   1. a written test
   2. a road test
   3. a vision test

Learning traffic laws and knowledge of what each road sign means is integral in facilitating an orderly and timely flow of traffic. Common sense dictates that all good drivers will attempt to avoid collisions with vehicles, objects, and pedestrians.

Do you know how to drive on the Internet?

Having little or no Internet knowledge can greatly impede Internet security concerns and expose home users to viruses, malware, botnets, rootkits, and a host of other data breaching vulnerabilities.

In essence, home users are the unlicensed drivers of the Internet. There are no prerequisite tests to pass. Anyone can use the Internet as long as they have the correct components and services. All you need to get on the Internet is hardware (computer and modem) and an Internet Service Provider (ISP), and you are good to go!

In reality, the Internet is the Wild Wild West of the 21st century. We do not want to live by government regulation or censorship, but, at the same time, most of us want to be able to travel the Internet safely.

The Internet itself is a dichotomy. It is the weakest link in attracting unscrupulous characters; the strongest link in disseminating information; entirely dependent upon a global …
2

Expert Comment

by:anuja anuja
It’s actually a cool piece of info about home users regarding internet security. I’m satisfied that you shared this helpful information with us.
Please keep us up to date like this. Thanks for sharing.
http://www.colblog.com/best-pc-tune-up-utilities
0
LVL 2

Expert Comment

by:Jaime Lewis
Hey teksquisite! It looks like that link at the beginning of your article is broken.
0

Cyber Security

664

Solutions

960

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.