Knowing the ways of the enemy

METHOD OF ENTRY

Article from Issue 56/2005

Most users have become so accustomed to networking that they never stop to ask if anyone may be listening. We all know we’d better be careful on the open Internet – even home users now use firewalls to keep intruders off the wires, and corporate admins throw in a Maginot line of proxy servers, honeypots, and tools of the DMZ. But what’s happening inside the firewall? How will you know if someone is listening – or maybe even impersonating another user? Statistics tell us that many attacks begin on the inside, from bored or disgruntled employees looking for a thrill, or possibly, from an even angrier sort looking for some form of revenge. In many corporate settings, a complete stranger can show up with a laptop and plug it to the network without exciting any response at all from the security system. The problem is even worse with wireless networks. A casual vandal standing across the street, or even in the next apartment, can make contact with your network.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Detecting Intruders Intro

    If you think your systems are too obscure for an attacker to worry about, think again. Today’s intruders are happy for any victim.

  • Security Strategies

    Is your data safe? Are your borders protected? This month we examine some expert techniques for building more secure networks.

  • Bluetooth Hacks

    The user rules in Linux – if you know where you’re going. This month the trail leads deep into the Linux Bluetooth stack.

  • Steganography Intro

    This month we look at hidden data, dastardly PDFs, safer surfing, and tools for better password control.

  • Go Wireless Intro

    When you’re going wireless,it pays to be careful. Get the right hardware,and make sure your network is as secure as you think it is.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News