If you keep it in house...
|
Author | Content |
---|---|
caitlyn Aug 22, 2013 4:18 PM EDT |
If you keep your sensitive data in house you control it. Whether you do a good job or a bad job with security is on you. If you put it in the cloud you surrender control. |
djohnston Aug 22, 2013 6:02 PM EDT |
Well said, Caitlyn. |
gus3 Aug 22, 2013 6:29 PM EDT |
If you keep it in-house, make sure you TURN OFF THE D@MN WIRELESS! |
caitlyn Aug 22, 2013 6:34 PM EDT |
Wireless can be secured to a reasonable degree. Wireless should always be on it's own subnet and the internal firewall can be set to limit inbound access severely. |
seatex Aug 22, 2013 6:41 PM EDT |
Sage advice, Caitlyn. Don't trust the cloud 3rd parties or internet in general, have an automated redundant backup process and secure your server as best you can. Do not surrender control. |
gus3 Aug 23, 2013 5:09 PM EDT |
Sorry, but every wireless protocol is pretty well compromised. The ones that aren't yet, soon will be, as CPU speed goes up and cracking tools get better. AFAIAC, the only "reasonable degree" of wireless security is when the antenna is powered down. |
BernardSwiss Aug 23, 2013 6:10 PM EDT |
> Sorry, but every wireless protocol is pretty well compromised. The ones that aren't yet, soon will be, as CPU speed goes up and cracking tools get better. Sounds interesting. Got a good link? |
gus3 Aug 25, 2013 12:45 PM EDT |
In a Google search, name the protocol, followed by "crack", and watch the suggestions pop up. |
BernardSwiss Aug 25, 2013 6:28 PM EDT |
Ah yes -- the benefit of knowing the most useful search terms. Thanks. |
thenixedreport Aug 26, 2013 9:03 AM EDT |
Depending on the size of a wireless network, you can have a list of allowed MAC addresses be the only ones allowed access to a wireless network in addition to existing security measures. The smaller the network, the longer it's going to take for anything to be broken, because from what I understand (unless things have changed in recent years), larger networks are more likely to have vulnerable packets. As for cloud storage, they should be treated only as a secondary remote backup solution. If that's the case, at least put the data in an encrypted archive before uploading. |
djohnston Aug 26, 2013 1:55 PM EDT |
Quoting:Depending on the size of a wireless network, you can have a list of allowed MAC addresses be the only ones allowed access to a wireless network in addition to existing security measures. Hmmm. I'll just quote the first section of this article: Quoting:MAC filtering: This is like handing a security guard a pad of paper with a list of names. Then when someone comes up to the door and wants entry, the security guard looks at the person's name tag and compares it to his list of names and determines whether to open the door or not. Do you see a problem here? All someone needs to do is watch an authorized person go in and forge a name tag with that person's name. The comparison to a wireless LAN here is that the name tag is the MAC address. The MAC address is just a 12 digit long HEX number that can be viewed in clear text with a sniffer. A sniffer to a hacker is like a hammer to a carpenter except the sniffer is free. Once the MAC address is seen in the clear, it takes about 10 seconds to cut-paste a legitimate MAC address in to the wireless Ethernet adapter settings and the whole scheme is defeated. MAC filtering is absolutely worthless since it is one of the easiest schemes to attack. The shocking thing is that so many large organizations still waste the time to implement these things. The bottom line is, MAC filtering takes the most effort to manage with zero ROI (return on investment) in terms of security gain. |
JaseP Aug 26, 2013 2:49 PM EDT |
Yep,... MAC filtering is "security for dummies" ... It keeps out casual crackers, but not those who know what they are doing... I used to use it when I was in an area with a lot of WiFi routers, just to keep out the casual script kiddies,... But it's useless as a true security measure. |
thenixedreport Aug 27, 2013 9:09 AM EDT |
Hence why I said in addition to the usual security measures. Obviously if the network is huge, other options should be used instead. |
Posting in this forum is limited to members of the group: [ForumMods, SITEADMINS, MEMBERS.]
Becoming a member of LXer is easy and free. Join Us!