Is Your Infrastructure Intrusion-Proof?

Yes, if your organization has an IS policy laid out that immediately halts and sends an alert on an unauthorized/suspicious act to access or manipulate information by an external party or an unprivileged user. But is that all? Not entirely. A story we had covered earlier on the CIO Pak website refers serves as a premise for what is to be discussed ahead. Accordingly, engineering an Enterprise Architecture that is intrusion-proof is where the CIO and CSO toggle. It is a critical element of an organization’s security if it intends to have a defense in-depth.

Why is it such a big deal? With faster bandwidth at fingertips of wiz kids that are always in the process of learning by error another technological breakthrough may it put at risk whatsoever, Enterprise Architectures become increasingly sensitive. At times, these attacks are intention-led by serious hackers, spies or whistleblowers that know quite-well how to backdoor into a Denial of Service attack. And therefore, an IT Enterprise Architect should first-most identify where are these threats most likely to originate, if these are external.

Heard of these?

- Corrupted Web Server Extensions

- Remote Data Services

- Overflow from Email Client

- Default SNMP ‘public’ strings

- Global File Sharing

- Weak Password (If you are human, you know what that means!)

Once all rudimentary work is done, the intrusion-detection system to be installed should be based on:

- A shortlist of the organization’s needs and requirements

- Tests performed on hardware and software installed

- Location closest to the production environment

What should be done next? Update as frequently as possible.

 

 

 



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Script | Android Forums | Wordpress Tutorials

0 comments:

Leave a Comment