If people are not reporting the hacks on their own network, then my question 
is, again: how are people determining what goes on their lists? "The media" was 
just an example on my part.

Secondly, how do you know that "a lot of times the biggest breaches are because 
the basics are being done from the start"? Is this from your personal 
experience? From reading things on the internet? From professional conferences? 
Some other reason? My follow-up question would be: why do you think that the 
sample size that you have seen is representative?

My questions are purely academic - I'm interesting in knowing more. My 
experience is different to many of the items so far offered, and I'd like to 
know whether it's because my experience isn't representative, people are in 
different environments, people read different things to me, etc.

FWIW, I note that you still don't answer the question

Cheers
Ken

From: Ziots, Edward [mailto:[email protected]]
Sent: Wednesday, 31 October 2012 7:38 PM
To: NT System Admin Issues
Subject: RE: 7 shortcuts To Get Your Network Hacked (huh?)

I can say this:


1)      People aren't going to talk about internal hacks on their networks 
(Op-Sec is in effect from my military days), so why even ask?

2)      Media sometimes is about as trustworthy as snake-oil potion from back 
in the 1800's. I feel that a lot of vulnerabilities that are discussed are 
sensationalized, and sometimes created to enhance FUD in the consumer base to 
boost sales of security "solutions" to pad companies bottom line.

But a lot of times the biggest breaches in security is because the basic's 
aren't being done correctly from the start, and the can is getting "kicked down 
the road" for a better term, until something bad happens, a lot are turning a 
blind eye to the aspect rather than meeting the challenge head-on and working 
towards a solution and improving their processes so that the risk that was 
identify and rememdiated does not crop up again in the configuration of 
systems. (This is where I do a lot of my current work in the %day-job%)

Z

Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]<mailto:[email protected]>

From: Ken Schaefer [mailto:[email protected]]
Sent: Wednesday, October 31, 2012 4:10 AM
To: NT System Admin Issues
Subject: RE: 7 shortcuts To Get Your Network Hacked (huh?)

I agree with the statement below. But it's not an answer to my question.


From: Ziots, Edward [mailto:[email protected]]
Sent: Wednesday, 31 October 2012 6:51 PM
To: NT System Admin Issues
Subject: RE: 7 shortcuts To Get Your Network Hacked (huh?)

Ken everyone's experiences are different, depends on where they work, which 
industry and what they are a target from. I am sure in healthcare I have a 
different risk profile as compared to the Banking industry, as compared to the 
retail industry.

Z

Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]<mailto:[email protected]>

From: Ken Schaefer [mailto:[email protected]]
Sent: Wednesday, October 31, 2012 3:39 AM
To: NT System Admin Issues
Subject: RE: 7 shortcuts To Get Your Network Hacked (huh?)

I'm curious to know how people are coming up with these lists. Are they based 
on personal experience of hacks in your own workplace? Or what you are 
seeing/reading "in the media"?

My experience is a fair bit different to most of the responses so far.

Cheers
Ken

From: Ziots, Edward [mailto:[email protected]]
Sent: Wednesday, 31 October 2012 6:29 PM
To: NT System Admin Issues
Subject: RE: 7 shortcuts To Get Your Network Hacked (huh?)


1)      Failure to properly harden their systems from attack. ( Patching, 
Access-lists, Firewall settings)

2)      Using unapproved software on systems that introduces malware, or Trojan 
backdoors on systems.

3)      Failure to properly use least privilege and separation of duties, to 
limit exposure to systems and processes.

4)      Using vulnerable database/Web applications which are exposed to the 
internet and are vulnerable to OWASP top 10 (Especially SQLi and XSS)

5)      Lack of proper ingress and egress filtering at firewall/VPN access into 
and out of the corporate network, DMZ and otherwise.

6)      Failure to use Antivirus or out of date signatures for AV/HIPS to 
detect common known malware/Trojans ( Again getting less effective by the day 
since a lot of malware these days is custom and it is used to bypass AV 
detection.

7)      Giving users admin privileges and not controlling code execution on 
endpoint systems (Again this is how most of the malware/malcode is getting on 
the systems in the first place ( drive by downloads, etc etc)

Z

Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]<mailto:[email protected]>

From: Stu Sjouwerman [mailto:[email protected]]
Sent: Tuesday, October 30, 2012 1:39 PM
To: NT System Admin Issues
Subject: 7 shortcuts To Get Your Network Hacked (huh?)

Hi Guys,

Yes, that was on purpose.  In your opinion, what are the most gruesome errors a 
system admin can make
which will result in getting their network hacked? Just jot down a few and 
reply to the list, I will tabulate
and come up with the 7 most mentioned sorted by importance.  This should be fun.

Have at it !!

Warm regards,

Stu



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to