One of the biggest reasons everything is a target is because nearly everything can be used as a weapon, and an attacker is motivated to acquire weapons to wield against future targets. So, nearly every successful attack has not only a direct result for the attacker, but an indirect result in that the attacker gains an additional weapon to use against new targets. For example, if an attacker is able to compromise a Dynamic Host Configuration Protocol (DHCP) server, consider the potential next step:
In all but the first and easiest attack example, the attacker utilizes the DHCP server as a means to attack other systems. Since nearly all of the most devastating break-ins require several steps on the part of the attacker, the notion of using your own systems as weapons against you is critical for the attacker's success. If your organization is the target of a directed attack from resourceful, dedicated attackers, which of the following attack scenarios is easier to successfully complete for the attacker?
The war-dialing example is far more likely to yield a good result for the attacker. If you put yourself in the attacker's place and assume the attacker has some knowledge of your environment, you often find that the things you must protect and the ways in which you must protect them are very different than the countermeasures you currently have deployed.
Although our first two examples center on an attacker using your existing systems as weapons, this will not always be the case. Attackers could introduce devices into your network as a means to further their goals. Consider the following attack sequence in which an attacker introduces an insecure WLAN network to a location without any WLAN connectivity:
Even if your organization has chosen not to deploy a certain technology because of the security risks (in this case, wireless LAN), nevertheless that technology's vulnerabilities can be used as a weapon against you.
Part I. Network Security Foundations
Network Security Axioms
Security Policy and Operations Life Cycle
Secure Networking Threats
Network Security Technologies
Part II. Designing Secure Networks
Device Hardening
General Design Considerations
Network Security Platform Options and Best Deployment Practices
Common Application Design Considerations
Identity Design Considerations
IPsec VPN Design Considerations
Supporting-Technology Design Considerations
Designing Your Security System
Part III. Secure Network Designs
Edge Security Design
Campus Security Design
Teleworker Security Design
Part IV. Network Management, Case Studies, and Conclusions
Secure Network Management and Network Security Management
Case Studies
Conclusions
References
Appendix A. Glossary of Terms
Appendix B. Answers to Applied Knowledge Questions
Appendix C. Sample Security Policies
INFOSEC Acceptable Use Policy
Password Policy
Guidelines on Antivirus Process
Index