Home > United Nations Online Network in Public Administration and Finance (UNPAN)
1. Global
Global
2. Africa
Africa
3. Arab States
Arab States
4. Asia & Pacific
Asia & Pacific
5. Europe
Europe
6. Latin America & Caribbean
Latin America & Caribbean
7. North America
North America
UNPAN Global
Public Administration News  
Share
Top 10 Network Security Threats
Source: govtech.com
Source Date: Friday, September 20, 2013
Created: Oct 08, 2013

With cyber-threats becoming a daily headache for IT security staff, it helps to have some advice, or at least know what to look out for. One researcher of Fortinet, a network security software provider, offered his observations on the top 10 threats that can harm networks from the inside and ways to combat them. And according to him, the number of threats just keeps growing.

“The ways that the networks can be compromised five years ago internally, certainly still exist. It’s just that today, that list is really growing, and that’s why this is ongoing research,” said Derek Manky, a project manager for cyber-security and threat research at Fortinet.

Manky said that the company has more than 100 researchers worldwide who monitor network activity.

“It’s really an ongoing case again of all this data that we’re seeing worldwide, all this feedback we’re getting, all the new threats that we’re seeing and how those threats can potentially affect systems,” he said.

According to the researchers, the top 10 internal network vulnerabilities are:

1.USB drives
2.laptops and netbooks
3.wireless access points
4.miscellaneous USB devices (digital cameras, MP3 players, etc.)
5.employees borrowing others’ machines or devices
6.the Trojan Human (attackers who visit sites disguised as employee personnel or contractors)
7.optical media (CDs, DVDs, etc.)
8.lack of employee alertness
9.smartphones
10.e-mail

The list also includes advice for prevention and mitigation, with tips like implementing asset control policies to handle removable media threats and implementing an encrypted file system for sensitive data.

Some potential security threats such as smartphones can be dangerous in part because people don’t see them as threats. And even though they can house viruses, the devices can threaten networks in ways people may not think of.

“If you have any sort of confidential information and you have access to that, even if the document doesn’t leave the quarantined area and you take a picture of that with a smartphone, you can send that over [a] 3G network. You can just keep it on the smartphone and walk out with it,” Manky said.

But when it comes to locking down networks and implementing security protocols, Manky said the government may be in a different position than the private sector when it comes to enforcement.

“They have a heavier hand. They can enforce this and say, ‘OK, across all agencies, we are banning this until we can think of what’s going on with this.’ So that is a good thing in my view because if you can properly enforce something, and you can take action on that, then it’s a step forward,” he said.

But there could be drawbacks. In addition to policy “turf wars,” Manky admits that different sectors of government can cause confusion if they’re trying to enforce the same thing but have different ideas on how to go about it.

(by Hilton Collins)

News Home

 Tag This
 Tell A Friend
del.icio.us digg this Slashdot
Rate:
0 ratings
Views: 342

Comments: 0 Bookmarked: 0 Tagged: 0



0 Comments | Login to add comment

Site map | FAQs | Terms and Privacy | Contact Us
Copyright 2008-2010 by UNPAN - United Nations Public Administration Network