Forget SARS – worry about the BAGLE­_WORM – everything is a target!

(PRWEB) April 9, 2004

If Raymond Chu -? Product Marketing Manager with the Advanced Technology Group of Cisco Systems Asia Pacific had its way, we d be the construction of a virtual?? moat around our hotels, and positioning of guards to a variety of electronic control points to avoid being hacked. ? So serious is the threat of malicious intrusion into one? S network, server, PC or laptop that has just one line of defense is probably just not good enough?, He said. In fact, some industry experts argue that you can place a new PC on the Internet, and within minutes, someone, or rather, something will try to hack it. This is not surprising when, according to the website of Network Associates -???? More than 81,000 threats exist today? ? now that? what I call scary!

being almost a daily reality, we hear of computer viruses (some more famous and prolific? ??,?? Melissa I love you? and? Blaster?) is going to happen for something intelligent less sinister attempt to thwart the less informed among us in a point by lowering the defenses often limited or beat those (those puny little), we have already set up so they can sneak across our network of destruction and devastation.

This form

state-of-the-art of terrorism is much smarter, faster and potentially more harmful to humanity than the guy who brandished a knife or AK47, or perhaps even these fanatics, we hear of a suicide C4 strap around their waist. The creators of these malicious kids (who seem to have nothing better to do with their time) stealthily float around cyberspace at the speed of light, knowing no boundaries, and insensitive to race, creed, religion or color. The consequences of such acts are so overwhelming, they can cause denial of service attacks on Web sites, forcing businesses to close with huge financial and social consequences. It is estimated that in 2003 global losses of viruses was U.S. $ 13 billion and incidents worldwide in the first three quarters of 2003 compared to the total number in 2000 was 700%. Increased loss due to denial of service attacks since 1999 were 2000%. An example of this horrible phenomenon of modern times is that the Slammer worm infected 75,000 hosts in the first eleven minutes with infection rates doubling every 8.5 seconds causing network outages, damage to ATM , canceled flights, and some companies have had to slow down or shut down for weeks.

list of aliases that people dream has no limits, some of which are known to label as a software patch from Microsoft? you need to install it immediately to prevent hacking? when in fact that’s exactly what they are? a virus .????

Most often when these critters harmful

into our system, they will collect email addresses from local files and spoof the? from the address?, so that when we receive e-mails they can lull us into a false sense of security appearing as if from a known sender. Some may even attempt to download a backdoor on a remote website by which one can easily get into your machine (at a later date) and not detected.

rightly, we used to think that the passwords were the best thing since sliced ​​bread when it comes to protecting access to computers and data, and to some extent that is always true. But remember, passwords are like toothbrushes, and must be changed every three months. And not just those with the anniversary or pet? Name or even a favorite type of food. They must be at least 8 digits in length and a combination of letters and numbers with people I know in adding some symbols of the increased complexity. Manager of your system through the effective use of operating systems (and no additional cost to the company) probably has the ability to force users to change passwords from time to time. Do you know if this is implemented on your system? When was the last time you were asked to change yours?


hotels have probably not been on the radar screen of potential hackers that will not be long before they knew what rich content is stored on the PMS, Accounting, Sales and restoration and HR / Payroll systems.

Based in Hong Kong with over 14 years experience in the business, Chu is responsible for marketing and business development for Cisco products and solutions for security in the Asia-Pacific region. It is often called upon to speak at security events and giving interviews like this. So when I met with him at his office, he said,? The establishment and implementation of company policies plays an important role when it comes to network security?. ? For example, in very basic level you need to know who and what has access to your networks and systems inside and outside your hotel. A mustn? T be naive enough to believe that all attacks are external? Simply set up a perimeter defense won? he? you need an integrated security information at all levels with devices inherently have their own protection? a network of self defense? with guards everywhere?. The results of a U.S. base 2003 FBI Computer Crime and Security Survey found that 22% of attacks were from in-house. Disgruntled employees exist, and in many cases can only too easily infect your network with a virus not necessarily a syringe, but downloaded from everyday items such as diskettes, CDs or USB keys.

There is also a real possibility that people could be stolen and sold your data to competitors or to a person who is ignoble who knows what the personal data of customers who stayed at your hotel. Imagine how your story or guest account information company in the open market? So it must be protected in much the same way you usually do with physical cashier.

If you want to sleep as deep in the night you expect your guests to their heavenly bed, then you must understand that network security is as important as the physical security of your building with some form of burly guard patrols . However, in reality, patrolling the perimeter of a network is no longer good enough, because with the advent of the Internet, a network is no longer a benefit or a defined limit. Another key reason for this is the advent of WAP? wireless access points.

Stories floated around for a while now which wireless access points thugs were surreptitiously connected to networks (for staff, third party engineers or unwanted intruders) that allow virtually undetected remote access to networks and siphoning of data. In all honesty could be your head of security and is the director put their hands on their hearts and swear that these documents do not exist on your LAN? Do they employ identity management techniques that manage each LAN port to be 100% sure what? S connected?

Most likely some form or another, your hotel is connected to the outside world and I really hope you have a firewall, with strict controls in place to police what data can flow in and out of your property. I guess you already have a back door policy that monitors the physical goods can enter and exit? And occasionally, you can do? Bag searches?. But as managers do you know what type of data is blocked or allowed to pass through the back door of your network? Keep in mind that emails are not the only mechanism for viruses to penetrate your defenses? Instant messaging is another channel where viruses can drag and data can escape – without your knowledge. While this innovative technology can save communication costs and improve productivity, it could also be the vehicle used for such acts of cyber-terrorism.

Talk to your

is manager and see if it make sense to deploy tools that can block pop-ups. A simple and free version of such a tool is available from Google.

We must also consider the impact that the broadband network on the Guest at the hotel. Do your guests to download any type of file they want, and visit a website they care about? Can guest who accesses your broadband network see other guests on the network, or perhaps the computers or other devices on the LAN hotel? Check with your IS Manager or broadband provider, so for added security and safety as each room has been set up a VLAN, which means that it in its own right? SA independent virtual network can not be seen or accessed by others.

Chu adds,? Remote access and telecommuting is an event every day on networks, and pursuant to allow such access to your network, you are potentially open to abuse?. ? Make sure you have policies and procedures in place and physical barriers to prevent unauthorized access?. ? Remember, if people can remotely access your network, so they can remotely access your data, and do with it what they want ??. p
Chu adds

saying? There should be more emphasis on it (network security)?. Richard Clarke, former Special Advisor to the President of the United States to the security of cyberspace once said,? The average amount of money, as a percentage of revenue that companies spend on security is 0.0025%, slightly less than they spend on coffee.? Industry standards suggest that security costs as a% of the 2003-2004 budgets should be as follows: 11% of small organizations and large organizations of 6-7% (source: Meta Group, Inc., 2003 )

Chu recommends? First make an assessment of security posture to discover vulnerabilities. Look for the break points, and where there are risks. You can even have equipment that has integrated security that has not been effectively deployed. If you do? T have the expertise in-house, and then to consult industry experts and partners seeking their advice on appropriate technologies and solutions such as IDS (Intrusion Detection System), IPS (Intrusion Prevention Systems) Firewall and identity management techniques. Make sure you deploy the technologies that are updated on a regular basis and are easy to manage.?

Gone are the days when his man against the machine – the machine today against the machine. Only humans are no longer able to defend yourself against the growing number of threats? your network must be intelligent enough to defend themselves automatically detecting potential attacks, alert administrators and dynamically reconfigure themselves in re-routing of data? in the blink of an eye.

Don? t delay? the walls have ears ????.

clear = “all”

This entry was posted in Last Longer In Bed and tagged , , , , , , , , , , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *