Conclusion

One of the really scary things about this break-in is that the intruder has never been caught. To the best of my knowledge, he's still out there rattling doors and setting new passwords to dormant accounts on other networks.

This break-in teaches us a lot about how to avoid hackers. Some of the lessons are:

  • Every account should have a password. (See Line #1.)

  • "Guest" accounts should be avoided. (Also see Line #1.)

  • Security patches must be applied to every machine in a network. (See Lines #6 to 23.)

  • Systems should be wary of trusting each other. (See Lines #105 to 119, #264 to 270, and #282 to 287.)

  • Dormant accounts must be regularly removed. Hackers often look for dormant accounts, since no one is likely to notice them using those accounts. (See Lines #320 to 393.)

  • You must always set new passwords after a successful break-in. (See Lines #394 to 426.)



IT Security. Risking the Corporation
IT Security: Risking the Corporation
ISBN: 013101112X
EAN: 2147483647
Year: 2003
Pages: 73

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net