If you keep it in house...

Story: Keeping data on-premise isn't 100 percent safe eitherTotal Replies: 12
Author Content
caitlyn

Aug 22, 2013
4:18 PM EDT
If you keep your sensitive data in house you control it. Whether you do a good job or a bad job with security is on you. If you put it in the cloud you surrender control.
djohnston

Aug 22, 2013
6:02 PM EDT
Well said, Caitlyn.
gus3

Aug 22, 2013
6:29 PM EDT
If you keep it in-house, make sure you TURN OFF THE D@MN WIRELESS!
caitlyn

Aug 22, 2013
6:34 PM EDT
Wireless can be secured to a reasonable degree. Wireless should always be on it's own subnet and the internal firewall can be set to limit inbound access severely.
seatex

Aug 22, 2013
6:41 PM EDT
Sage advice, Caitlyn. Don't trust the cloud 3rd parties or internet in general, have an automated redundant backup process and secure your server as best you can. Do not surrender control.
gus3

Aug 23, 2013
5:09 PM EDT
Sorry, but every wireless protocol is pretty well compromised. The ones that aren't yet, soon will be, as CPU speed goes up and cracking tools get better. AFAIAC, the only "reasonable degree" of wireless security is when the antenna is powered down.
BernardSwiss

Aug 23, 2013
6:10 PM EDT
> Sorry, but every wireless protocol is pretty well compromised. The ones that aren't yet, soon will be, as CPU speed goes up and cracking tools get better.

Sounds interesting. Got a good link?
gus3

Aug 25, 2013
12:45 PM EDT
In a Google search, name the protocol, followed by "crack", and watch the suggestions pop up.
BernardSwiss

Aug 25, 2013
6:28 PM EDT
Ah yes -- the benefit of knowing the most useful search terms. Thanks.
thenixedreport

Aug 26, 2013
9:03 AM EDT
Depending on the size of a wireless network, you can have a list of allowed MAC addresses be the only ones allowed access to a wireless network in addition to existing security measures. The smaller the network, the longer it's going to take for anything to be broken, because from what I understand (unless things have changed in recent years), larger networks are more likely to have vulnerable packets.

As for cloud storage, they should be treated only as a secondary remote backup solution. If that's the case, at least put the data in an encrypted archive before uploading.
djohnston

Aug 26, 2013
1:55 PM EDT
Quoting:Depending on the size of a wireless network, you can have a list of allowed MAC addresses be the only ones allowed access to a wireless network in addition to existing security measures.


Hmmm. I'll just quote the first section of this article:

Quoting:MAC filtering: This is like handing a security guard a pad of paper with a list of names. Then when someone comes up to the door and wants entry, the security guard looks at the person's name tag and compares it to his list of names and determines whether to open the door or not. Do you see a problem here? All someone needs to do is watch an authorized person go in and forge a name tag with that person's name. The comparison to a wireless LAN here is that the name tag is the MAC address. The MAC address is just a 12 digit long HEX number that can be viewed in clear text with a sniffer. A sniffer to a hacker is like a hammer to a carpenter except the sniffer is free. Once the MAC address is seen in the clear, it takes about 10 seconds to cut-paste a legitimate MAC address in to the wireless Ethernet adapter settings and the whole scheme is defeated. MAC filtering is absolutely worthless since it is one of the easiest schemes to attack. The shocking thing is that so many large organizations still waste the time to implement these things. The bottom line is, MAC filtering takes the most effort to manage with zero ROI (return on investment) in terms of security gain.


JaseP

Aug 26, 2013
2:49 PM EDT
Yep,... MAC filtering is "security for dummies" ... It keeps out casual crackers, but not those who know what they are doing... I used to use it when I was in an area with a lot of WiFi routers, just to keep out the casual script kiddies,... But it's useless as a true security measure.
thenixedreport

Aug 27, 2013
9:09 AM EDT
Hence why I said in addition to the usual security measures. Obviously if the network is huge, other options should be used instead.

Posting in this forum is limited to members of the group: [ForumMods, SITEADMINS, MEMBERS.]

Becoming a member of LXer is easy and free. Join Us!