Network Security

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Share tech news, updates, or what's on your mind.

Sign up to Post

Think Like An Attacker
It is important to think like an attacker for an individual who is responsible for cloud data security in his or her business. Therefore, here we came with this post to aware users with main points that hackers consider while attempting an attack.
0
OWASP: Threats Fundamentals
LVL 13
OWASP: Threats Fundamentals

Learn the top ten threats that are present in modern web-application development and how to protect your business from them.

Scenario 10
This article is about building Dynamic Multipoint VPN tunnels in Cisco CSR1000V router with IOS XE. There are two CSR1000V hub routers configured with dual hub dual cloud Phase 3 DMVPN.
0
Scenario 9
This article is about building Dynamic Multipoint VPN tunnels in Cisco CSR1000V router with IOS XE. There are two CSR1000V hub routers configured with single tier Phase 3 DMVPN Cloud.
0
Scenario 8
This article is about building Dynamic Multipoint VPN tunnels in Cisco CSR1000V router with IOS XE. There are two spoke routers connected to single tier Phase 3 DMVPN Cloud hosted on CSR1000V router.
0
Scenario 7
This article is about building Dynamic Multipoint VPN tunnels in Cisco CSR1000V router with IOS XE. There are two spoke routers connected to single tier Phase 1 DMVPN Cloud hosted on CSR1000V router.
0
Spam Passing through Cisco Cloud Email Security -

If you're having problems where a lot of messages that Cisco Cloud Email Security would normally filter out have been coming in, it appears to be the result of an upgrade gone wrong. In our case, it took a P1 ticket to get resolved.


We found evidence of an issue by looking at the incoming mail policies (accessible by going to Mail Polices > Incoming Mail Policies):



You will notice that the Anti-Spam, Anti-Virus, and Graymail columns are all showing "Not Available". That is because they are all disabled. These all need to be enabled to get things working normally again.


When we accessed the Cisco IronPort Anti-Spam settings, it showed that it was globally turned off. (This can be accessed by going to Security Services > IronPort Anti-Spam).



However, we were completely unable to turn anything on, regardless of access level (I'm a Cloud Administrator, but my coworker is an Administrator).


The cause of the problem: Cisco upgrading our appliance, and it turned out the feature keys somehow got blown out. In setting them back in, there is a requirement of accepting an End User License Agreement. Somewhere within this area is where Cisco failed to properly handle things.


Resolving this required creating a ticket with Cisco (initially a P3 ticket, which eventually got escalated to P1). If you're seeing yourself with this exact same issue, know you're not alone. Hopefully, Cisco fixes this for all of their CES customers in one swoop, but just watch out for this just in case. 


This problem started this past Friday morning for us but has just gotten resolved as I'm creating this post. While getting the ticket resolved, I highly recommend requesting that Cisco adds an email address from your organization to Atlas so that you're notified of when upgrades are planned to take place.

1
Coming up with a good network security checklist can be challenging. The list below was created with input from not less than a dozen technology consultants and security experts.
4
LVL 99

Author Comment

by:Lee W, MVP
Comment Utility
Not a bad point.  BUT, keep in mind the general target audience is small to midsize companies and the consultants they use.  2FA on a Windows Domain in those environments isn't commonplace (I've not heard of any really good, really SMB affordable solutions... at least none come to mind).

If you have any recommendations, please feel free to make them.
0

Expert Comment

by:kevin_lovegrove
Comment Utility
I'd personally recommend ManageEngine PMP, it does a whole lot more than 2FA and I think the prices are very reasonable considering the risks it mitigates.

https://www.manageengine.com/products/passwordmanagerpro/

It supports a number of 2FA solutions:

https://www.manageengine.com/products/passwordmanagerpro/two-factor-authentication.html
0
Scenario 5
This article is about building a Route Based site to site VPN tunnels with VRF and dynamic routing protocol (OSPF) in Cisco CSR1000V router with IOS XE. There are two Route Based IPsec VPN tunnels configured on CSR1000V router, traffic from app server is with NAT and rest is without NAT.
0
SIEM must examine concepts of normality and abnormality traffic/data flow patterns. SIEM need to constitute use of adaptive intelligence. Companies need to evaluate SIEM products based on their own objectives to determine the product that best meet their needs.
6

Expert Comment

by:Gökhan POLAT
Comment Utility
Great article 👍
1

Expert Comment

by:Ahmed Ali Khan
Comment Utility
Very detailed and insight information of SIEM solutions!
1
Scenario 4
This article is about building a Route Based site to site VPN tunnels with dynamic routing protocol (OSPF) in Cisco CSR1000V router with IOS XE. There are two Route Based IPsec VPN tunnels configured on CSR1000V router, traffic from app server is with NAT and rest is without NAT.
0
Become a Certified Penetration Testing Engineer
LVL 13
Become a Certified Penetration Testing Engineer

This CPTE Certified Penetration Testing Engineer course covers everything you need to know about becoming a Certified Penetration Testing Engineer. Career Path: Professional roles include Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.

When you have a Wi-Fi, you might want to isolate the untrusted network from your network, since Wi-Fi is more vulnerable to attacks, as is a guest network. You will still be able to manage guest/Wi-Fi from your network. This is possible to do with an Edge router
0
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
6
A discussion about Penetration Testing and the Tools used to help achieve this important task.
0
Password-Managers
Each password manager has its own problems in dealing with certain websites and their login methods. In Part 1, I review the Top 5 Password Managers that I've found to be the best. In Part 2 we'll look at which ones co-exist together and why it's often useful to use more than one.
12
LVL 32

Expert Comment

by:Thomas Zucker-Scharff
Comment Utility
Andrew,

Have you read the latest information regarding password managers?  I saw something this morning on LinkedIn and did a search and found this:

https://www.komando.com/happening-now/547660/hackers-find-security-flaws-in-5-popular-password-managers-are-you-safe

It comes down to password managers exposing your passwords!!

This is extremely disconcerting as I have several hundred passwords stored in my PM.
1
LVL 28

Author Comment

by:Andrew Leniart
Comment Utility
Thank you for the heads up, Thomas. No, I hadn't read that article as yet and am as alarmed as you are about the prospect.

at least five popular password managers, including 1Password, Dashlane, KeePass and LastPass, could potentially leak unencrypted credentials and passwords while they're running in the background.

That's very disconcerting information on its own! I'm sure glad that RoboForm, Avast, and Sticky Password (the three password managers I'm currently using) didn't make that list, but two of those, 1Password and Dashlane, are in my review as recommended. :-o

Given the large number of Popups that broke through Adblock Plus when I visited your link, I think I'll quote the article here so others can read it without all of the annoying popups.

Crediting Source: Hackers find security flaws in 5 popular password managers. Are you safe? - By "The King Komando Show"

Hackers find security flaws in 5 popular password managers. Are you safe?

Password managers are great tools for hardening your online security and, trust me, they can definitely make your life easier. But as always, like anything that's powered by software, password managers are not perfect and they're not impervious to hacks and malware.

This new research proves just that. According to new information published by Independent Security Evaluators (ISE), at least five popular password managers, including 1Password, Dashlane, KeePass and LastPass, could potentially leak unencrypted credentials and passwords while they're running in the background.

How severe are these issues? Or are they nothing to worry about? Let's break them down.

It's like leaving your keys under your PC's doormat

The researchers from ISE (read: white hats aka the good hackers) said that the password managers they examined don't always encrypt and clear the password from a computer's memory while transitioning from an unlocked (password manager is running) to a locked (user is logged out) state.

1Password, in particular, keeps the master password in memory while unlocked and fails to clear it out when it goes back to its locked state. In some cases, the master password can even be viewed in clear text while the software is locked. Yep, in a way, it's like leaving your keys under your doormat.

Surprisingly, 1Password's newer version, 1Password7, is even worse since it decrypted all individual passwords in ISEs test, cached them all in the computer's memory and failed to clear them out while transitioning from its unlocked state.

In Dashlane's case, only the last active password is exposed in memory while it's running, but once a user updates any information on an entry, it exposes its entire database in plaintext in a computer's memory. Worse, this information then remains there even after a user logs out of Dashlane.

Similarly, KeePass and LastPass also showed vulnerabilities by keeping some of their unencrypted entries in a computer's memory even after they return to their locked states.

In most cases, closing out of a password manager completely (not just logging out of it) is the only way to clear the cached passwords from your computer's memory.

They're only as strong as your computer's defenses

Is it time to panic? Not exactly. Here's an important thing to keep in mind regarding these flaws -- these are only exploitable if a hacker has already managed to install malware on your computer. Your computer's operating system has built-in defenses against these type of memory access attacks, anyway.

If someone can already peer into your password manager's cached data, then your entire system is already compromised and your computer has bigger problems than that. Spoiler alert: Keyloggers, spyware, remote access software and ransomware can do much worse damage, and your password for CuteShoes.com may just be the icing on the cake.

In fact, these security issues on password managers are nothing new and they're all inherent to how they work within, say, an operating system like Windows 10. Thankfully, developers are still coming up with new mechanisms to protect password managers against cleartext password exposures in memory and malware attacks in general.

The bottom line is this - if you are not employing good security measures on your computer, then nothing, not even your password manager, can keep you safe.

Keeping your software updated by patching regularly, using reliable security software, strong passwords and enabling two-factor authentication are just some of the best practices you can do to keep your gadgets safe. Click here for more.  Oh, and before I forget, using a password manager is still highly recommended. Please -- don't stop using yours.

Bonus: Our sponsor F-Secure TOTAL is a complete cybersecurity package that includes password protection. Store all your important credentials in one secure password manager and use them faster and easier to log into your favorite services or pay securely online. Just visit F-Secure.com/Kim.

Will be very interesting to follow this and see how it pans out.

Regards, Andrew
0
2017 was a scary year for cyber security. Hear what our security experts say that hackers have in store for us in 2018.
0
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense Magazine.
1
How to fix a SonicWall Gateway Anti-Virus firewall blocking automatic updates to apps like Windows, Adobe, Symantec, etc.
0
Phishing emails are a popular malware delivery vehicle for attack. While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to come from a trusted source. Ready to learn more?
1
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
4
CEOs need to know what they should worry about
CEOs need to know what they should worry about

Nearly every week during the past few years has featured a headline about the latest data breach, malware attack, ransomware demand, or unrecoverable corporate data loss. Those stories are frequently followed by news that the CEOs at those companies were forced to resign.

A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
1
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
0
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
0
How does someone stay on the right and legal side of the hacking world?
10
In this article, we’ll look at how to deploy ProxySQL.
0
Compliance and data security require steps be taken to prevent unauthorized users from copying data. Here's one method to prevent data theft via USB drives (and writable optical media).
3
LVL 99

Author Comment

by:Lee W, MVP
Comment Utility
Ok, thanks!
0
LVL 12

Expert Comment

by:Senior IT System Engineer
Comment Utility
Thanks for sharing the great article.
0

Network Security

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.