Identifying Risks, Response, and Recovery
Amy E. Moody
Strayer University
CIS333
Professor Williams
IDENTIFYING RISKS, RESPONSE AND RECOVERY 2
Identifying Risks, Response and Recovery I previously identified several types of attacks, threats and vulnerabilities that exist with your multilayered network. I have now been charged with the responsibility of developing a strategy to deal with these risks as well as a plan to mitigate each risk to reduce the impact that each will have on your organization. Your firewall, which is your first line of defense, is susceptible to two common types of attacks. First there are attacks against the firewall itself with the purpose of the attacker being to take control of the firewalls functionality and then launching a DoS attack. The second type of attack against firewalls is an attack on the LAN side of the firewall. These attacks circumvent the rules and policies of the firewall to gain access to the devices that are supposed to be protected by the firewall. The largest vulnerability that exists with firewalls is improper configuration settings. This can lead to the development of security holes which allow unauthorized access from both outside and within your network. All of the aforementioned attacks, threat and vulnerabilities can be mitigated and or avoided altogether.
There are several keys to ensuring that your firewall is as secure as possible. Use a VPN for all non-public traffic. Ports on your firewall should only be open for services that are utilized by the public. Because most people have dynamic IP addresses, your firewall has to constantly open ports and modify its rules to allow access, this can lead to ports being left open and vulnerable to attacks. Limit the size of your network. Simply put, if you don’t need it, turn it off. If your servers are not running a service that is used by the public, don’t allow it
References: 2009, September 30). 5 Easy Firewall Steps to Identify and Prevent Attacks. Retrieved August 14, 2012, from http://blog.inetu.net/2009/09/5-easy-firewall-steps-to-identify-and-prevent-attacks Deploying Firewalls Throughout Your Organization [Cisco IOS Firewall] - Cisco Systems. Retrieved July 26, 2012, from Deploying Firewalls Throughout Your Organization [Cisco IOS Firewall] - Cisco Systems. Retrieved July 26, 2012, from http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5710 Gandhi, M. , & Srivatsa, S. Detecting and preventing attacks using network intrusion. International Journal of Computer Science and Security, 2(1), 49-60. Retrieved , from http://www.cscjournals.org/csc/manuscript/Journals/IJCSS/Volume2/Issue1/IJCSS-28.pdf Kim, D. , & Solomon, M. (2012). Fundamentals of Information Systems Security. Sudbury, MA: Jones & Bartlett Learning. Mah, P. (2012, January 31). 5 Steps to Protect Exchange Server from Security Attacks. Retrieved July 25, 2012, from http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks Northrup, T. Firewalls. Retrieved July 25, 2012, from http://technet.microsoft.com/en-us/library/cc700820.aspx