SlideShare a Scribd company logo
1 of 3
“Who's knocking at my firewall door?”
             And, other sundry things to know for the non-profit hands-on CIO
Security is like play putty these days; everything is malleable and every changing. How is a CIO
or IT manager with limited experience in a low-budget nonprofit to keep up without breaking the
bank?
First off, for 2010, there are some security items you should be aware of as trends emerge.

•Robots.txt...Ever see that file on your webserver? (Ro)bots (or spiders) are scripts or applications that
search out information on the web. Search engines constantly scour the web for information using this
method. The robots.txt file can be a powerful tool to exclude the search bots from reading/indexing
your webpages. But, bots also are used by those nasty folks on the web that like to steal your
information or trash your website. They are the basis for most cybercrime as they constantly will knock
on your servers' door constantly without any user interaction. Bots are of those that constantly knock
on our firewall door or seek our passwords to break into our “secure” portals and websites.
•Where did my month's bandwidth allowance go? Malicious hacking of websites using SQL
injections, open ports, poor permissions, etc., leads to malware installation. They get to use your server
to meet their profitable needs.
•Is my hardware secure? Well, really, the question is more about whether the operating system is
secure. While Microsoft Windows still carries its woes on attacks, Macintosh, as a viable commercial
product and now with Leopard on a near open source platform, proves it can possibly stay ahead of the
malware infiltrators. Time will tell. But, you don't have to be brave anymore to play around with other
operating systems. Try a flavor of Linux like Ubuntu or Linux Mint or the 20+ other distributions out
there. Even Google's Chrome OS is a prime choice slated to be the next netbook OS of choice.
•Software piracy. Careful about buying cheap software from unknown sources. They may be infected.
Remember the malware scare about free downloads a decade ago. Well, it's back.
•Social networking sites, yes, are the next and prime targets for cyber do-no-gooders. We recently saw
this in the Google/China case where Chinese crackers (bad hackers) broke into activist Gmail accounts.
Bad China country, bad.
•Is it the wave or my surfboard that is muy mal? Malvertising and toxic web search results will be
on the rise. Those poor newbie Luddites will have your day humming and your work queue crashing.
Other platforms like Java and Flash could end up being the (once again?) culprits. Maybe it is time to
invest in another operating system and migration now save your hair and fingernails.
•Smartphones. Smart for you but dumb enough for the malicious hacker to inject all kinds of nice stuff
in there. While Windows still is the most vulnerable, the other operating systems may “light” enough to
also be affected eventually. It will be interesting to see how Apple's iPhone and Google's Android will
evolve.
•Hands-on hacking. There are reports all over the web that long-term plans for inside jobs maybe on
the rise. (see http://arunaurl.com/3cd2) Check your new IT staff or contractors out very well. Getting
referrals from known friends and colleagues may be the way to go even if it costs you a few bucks
more. For more info, web search for: hacking “inside job”
(As of late, the China/Google scandal commandeers at least the first three search pages. Click ahead for
more variety.)
•Cloud computing. A network cloud is just a collection of servers living out on the Internet providing
various services much like how websites are served from a webserver but in a much larger scalable
fashion. Software as a Service (SaaS) are online applications that frequently live on cloud servers much
like how you access your webmail account. The jury is still out on where and what it's evolving into but
be assured if you're passing vital information constantly over the web to who knows where to be
processed heavily on the cloud, someone will figure out how to 'wiretap' your line.
•Clickjacking or User Interface (UI) Redressing. According to Wikipedia: “a malicious technique of
tricking Web users into revealing confidential information or taking control of their computer while
clicking on seemingly innocuous Web pages. A vulnerability across a variety of browsers and
platforms, a clickjacking takes the form of embedded code or script that can execute without the user's
knowledge, such as clicking on a button that appears to perform another function.” Get it?!

For many of these issues, good spam/virus filtering is essential. At my organization, we use
http://Zimbra.com's Collaboration Suite Network Edition which has a good configuration of
SpamAssassin designed for it. But, I also use http://Death2Spam.net as an incoming mail filter proxy.
In addition, ZCS has a robust access control list (ACL) management system to customize which staff
gets access to what on a very granular level. It's fairly reasonable for a non-profit and works quite well.

These and others are plenty to watch out for and educate yourself on but could take some semesters in
studying to get comfortable with. I am a trained social worker and life coach besides being a self-taught
computerist since 1976 on my Commodore Vic20. The promise of learning a trade yourself is true and
can be realized if dedicated to it. Hooking up with a cohort or a group of like-minded folks that has
each others' interests and backs to support is a great way to not only learn but to build, gain and
exchange trust with your peers. I have 3 or more people (and discussion boards) I can contact at any
time of the day (really!) when trouble arises to get an instant answer. Plus, there is always the trusty
search engine.

But, there is an even more basic, fundamental problem that only recently has information technology
begun to tackle. This being passwords. This has got to be the most vulnerable access point for the
majority of login instances ever. Think about it.

You just finished six months of review and in the sandbox with a new open-source collaborative
communications system for your office staff. A central oasis of tools, functions and widgets that will
excel productivity for the organization. Comes with a speed server software, powerful spam/virus
blocker, ample security, ACL in such granularity it will prevent an flea from accessing any feature and
so on. You also invested in two rack-mounted dual quad-core w/ 16gb of RAM powerhouse “pizza
boxes” to boot and a new router. You're cranked up and ready to go!

You give your staff the pre-training, the pre-launch training and the on-launch training.

You set them up with their profiles and temporary passwords that are already randomly hardened with a
combination of numbers, capital letters and punctuation symbols. After logging in for the first time they
are instructed to change their temporary password.

But, as you make your rounds to check in on how they are doing, you oversee a few logging in with
their dog's name, the name of the org, the current year and make of their car, or even their birthday
which is now seen by the millions of Facebook, MySpace, Friendster, Tribe, Twitter and who knows
what other social networking profiles out there!
I have little hair left on my head but that is hereditary but for you it could be diagnosed as latent onset
of Trichotillomania. I get my calm from 30 years of T'ai Chi practice. But, I digress.
There is an answer that could hold you over for the time being. Many web-based applications and
SaaS products are beginning to adopt http://OpenID.net standards. This means one cryptic, difficult
password for your staff to remember to log into many online websites. In fact, the password doesn't
even get stored on the website and there is no way to trace it back. Yes, if there is keylogger malware
that made it into a computer you could be tracked that way but this is a viable alternative.

In addition, if you are a little more concerned (sorry cynics, this is way short of paranoia), keyed
password certificates on a thumb drive could work, too.

Security is always changing and evolving. It morphs this way and transmogrifies that way and reveals
new cracks in the systems we use each and every day from our cellphones to ATMs to voting machines
providing fertile ground for those with malicious intentions to infiltrate our data and productivity every
day, if not, every second. It is not only a full time job but also though process gnawing at us with
anxiety whether we are going to be the next victim of tampering.

If you set up enough monitoring and preventive measures, even if you get a lot of port-knockers, any
apparent breach will become very, very noticeable thus reducing your time in research as the culprit
pops up on your screen or in a email notification, and in psychological therapy due to lack of sleep and
excessive anxiety and delusional paranoia.

There is no real protection anywhere in life. But, what you can do is prevent like learning a self-defense
martial art by educating yourself enough and using powerful tools developed by trustworthy others that
have direct meaning and service to your needs.

Live long and prosper.
                ~ Spock

Bruce M. Wolfe, has a masters degree in Social Work with an emphasis on Social Development and is
the Chief Information & Technology Officer for http://MarinInstitute.org, an alcohol industry
watchdog and president of vCampaign, Inc., developers of low-budget modern campaign websites. He
is a 35+ year practitioner of a variety of martial arts of which most has been in the Chinese internal
school.

More Related Content

What's hot

An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemskhalavak
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 

What's hot (20)

La pecera 3
La pecera 3La pecera 3
La pecera 3
 
Hamza
HamzaHamza
Hamza
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Hacking 09 2010
Hacking 09 2010Hacking 09 2010
Hacking 09 2010
 
Information security
Information securityInformation security
Information security
 
La Pecera 4
La Pecera 4La Pecera 4
La Pecera 4
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
 
Password hacking
Password hackingPassword hacking
Password hacking
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
eForensics_17_2013_KMOKER
eForensics_17_2013_KMOKEReForensics_17_2013_KMOKER
eForensics_17_2013_KMOKER
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 

Viewers also liked

Johnlocke 130212070222-phpapp02
Johnlocke 130212070222-phpapp02Johnlocke 130212070222-phpapp02
Johnlocke 130212070222-phpapp02lesperlesnegres
 
για τη γιορτή της μητέρας
για τη γιορτή της μητέραςγια τη γιορτή της μητέρας
για τη γιορτή της μητέραςguestae8b37d
 
Kant, el filòsof de la raó
Kant, el filòsof de la raóKant, el filòsof de la raó
Kant, el filòsof de la raólesperlesnegres
 
Assessing Skills: Aspire champ magazine Issue 12 March 2016
Assessing Skills: Aspire champ magazine Issue 12 March 2016Assessing Skills: Aspire champ magazine Issue 12 March 2016
Assessing Skills: Aspire champ magazine Issue 12 March 2016Luke Gallagher
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Conceptsguest0e7119
 
O βρασμένος βάτραχος
O βρασμένος βάτραχοςO βρασμένος βάτραχος
O βρασμένος βάτραχοςguestae8b37d
 
Indefinite pronouns Indefinite Compounds Every Some Any
Indefinite pronouns Indefinite Compounds Every Some AnyIndefinite pronouns Indefinite Compounds Every Some Any
Indefinite pronouns Indefinite Compounds Every Some AnyEmerson Macedo
 
Concepcions filosòfiques sobre l’ésser humà´
Concepcions filosòfiques sobre l’ésser humà´Concepcions filosòfiques sobre l’ésser humà´
Concepcions filosòfiques sobre l’ésser humà´lesperlesnegres
 

Viewers also liked (17)

Modal Verbs
Modal VerbsModal Verbs
Modal Verbs
 
Johnlocke 130212070222-phpapp02
Johnlocke 130212070222-phpapp02Johnlocke 130212070222-phpapp02
Johnlocke 130212070222-phpapp02
 
Fibras alimentares e saúde
Fibras alimentares e saúdeFibras alimentares e saúde
Fibras alimentares e saúde
 
για τη γιορτή της μητέρας
για τη γιορτή της μητέραςγια τη γιορτή της μητέρας
για τη γιορτή της μητέρας
 
Kant, el filòsof de la raó
Kant, el filòsof de la raóKant, el filòsof de la raó
Kant, el filòsof de la raó
 
Assessing Skills: Aspire champ magazine Issue 12 March 2016
Assessing Skills: Aspire champ magazine Issue 12 March 2016Assessing Skills: Aspire champ magazine Issue 12 March 2016
Assessing Skills: Aspire champ magazine Issue 12 March 2016
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Concepts
 
Adjectives
AdjectivesAdjectives
Adjectives
 
Fibras alimentares e saúde
Fibras alimentares e saúdeFibras alimentares e saúde
Fibras alimentares e saúde
 
6 felicitat i justicia
6 felicitat i justicia6 felicitat i justicia
6 felicitat i justicia
 
σρίκη!!!
σρίκη!!!σρίκη!!!
σρίκη!!!
 
O βρασμένος βάτραχος
O βρασμένος βάτραχοςO βρασμένος βάτραχος
O βρασμένος βάτραχος
 
Unitat 2 (2)
Unitat 2 (2)Unitat 2 (2)
Unitat 2 (2)
 
Indefinite pronouns Indefinite Compounds Every Some Any
Indefinite pronouns Indefinite Compounds Every Some AnyIndefinite pronouns Indefinite Compounds Every Some Any
Indefinite pronouns Indefinite Compounds Every Some Any
 
Announcements
AnnouncementsAnnouncements
Announcements
 
False Cognates
False CognatesFalse Cognates
False Cognates
 
Concepcions filosòfiques sobre l’ésser humà´
Concepcions filosòfiques sobre l’ésser humà´Concepcions filosòfiques sobre l’ésser humà´
Concepcions filosòfiques sobre l’ésser humà´
 

Similar to Who's that knocking on my firewall door?

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistPixel Crayons
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Network Threats
Network ThreatsNetwork Threats
Network ThreatsDan Oblak
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
Prevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Controlmorticelocksnational21
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 

Similar to Who's that knocking on my firewall door? (16)

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Pentest trends 2017
Pentest trends 2017Pentest trends 2017
Pentest trends 2017
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Prevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Control
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Who's that knocking on my firewall door?

  • 1. “Who's knocking at my firewall door?” And, other sundry things to know for the non-profit hands-on CIO Security is like play putty these days; everything is malleable and every changing. How is a CIO or IT manager with limited experience in a low-budget nonprofit to keep up without breaking the bank? First off, for 2010, there are some security items you should be aware of as trends emerge. •Robots.txt...Ever see that file on your webserver? (Ro)bots (or spiders) are scripts or applications that search out information on the web. Search engines constantly scour the web for information using this method. The robots.txt file can be a powerful tool to exclude the search bots from reading/indexing your webpages. But, bots also are used by those nasty folks on the web that like to steal your information or trash your website. They are the basis for most cybercrime as they constantly will knock on your servers' door constantly without any user interaction. Bots are of those that constantly knock on our firewall door or seek our passwords to break into our “secure” portals and websites. •Where did my month's bandwidth allowance go? Malicious hacking of websites using SQL injections, open ports, poor permissions, etc., leads to malware installation. They get to use your server to meet their profitable needs. •Is my hardware secure? Well, really, the question is more about whether the operating system is secure. While Microsoft Windows still carries its woes on attacks, Macintosh, as a viable commercial product and now with Leopard on a near open source platform, proves it can possibly stay ahead of the malware infiltrators. Time will tell. But, you don't have to be brave anymore to play around with other operating systems. Try a flavor of Linux like Ubuntu or Linux Mint or the 20+ other distributions out there. Even Google's Chrome OS is a prime choice slated to be the next netbook OS of choice. •Software piracy. Careful about buying cheap software from unknown sources. They may be infected. Remember the malware scare about free downloads a decade ago. Well, it's back. •Social networking sites, yes, are the next and prime targets for cyber do-no-gooders. We recently saw this in the Google/China case where Chinese crackers (bad hackers) broke into activist Gmail accounts. Bad China country, bad. •Is it the wave or my surfboard that is muy mal? Malvertising and toxic web search results will be on the rise. Those poor newbie Luddites will have your day humming and your work queue crashing. Other platforms like Java and Flash could end up being the (once again?) culprits. Maybe it is time to invest in another operating system and migration now save your hair and fingernails. •Smartphones. Smart for you but dumb enough for the malicious hacker to inject all kinds of nice stuff in there. While Windows still is the most vulnerable, the other operating systems may “light” enough to also be affected eventually. It will be interesting to see how Apple's iPhone and Google's Android will evolve. •Hands-on hacking. There are reports all over the web that long-term plans for inside jobs maybe on the rise. (see http://arunaurl.com/3cd2) Check your new IT staff or contractors out very well. Getting referrals from known friends and colleagues may be the way to go even if it costs you a few bucks more. For more info, web search for: hacking “inside job” (As of late, the China/Google scandal commandeers at least the first three search pages. Click ahead for more variety.) •Cloud computing. A network cloud is just a collection of servers living out on the Internet providing various services much like how websites are served from a webserver but in a much larger scalable
  • 2. fashion. Software as a Service (SaaS) are online applications that frequently live on cloud servers much like how you access your webmail account. The jury is still out on where and what it's evolving into but be assured if you're passing vital information constantly over the web to who knows where to be processed heavily on the cloud, someone will figure out how to 'wiretap' your line. •Clickjacking or User Interface (UI) Redressing. According to Wikipedia: “a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous Web pages. A vulnerability across a variety of browsers and platforms, a clickjacking takes the form of embedded code or script that can execute without the user's knowledge, such as clicking on a button that appears to perform another function.” Get it?! For many of these issues, good spam/virus filtering is essential. At my organization, we use http://Zimbra.com's Collaboration Suite Network Edition which has a good configuration of SpamAssassin designed for it. But, I also use http://Death2Spam.net as an incoming mail filter proxy. In addition, ZCS has a robust access control list (ACL) management system to customize which staff gets access to what on a very granular level. It's fairly reasonable for a non-profit and works quite well. These and others are plenty to watch out for and educate yourself on but could take some semesters in studying to get comfortable with. I am a trained social worker and life coach besides being a self-taught computerist since 1976 on my Commodore Vic20. The promise of learning a trade yourself is true and can be realized if dedicated to it. Hooking up with a cohort or a group of like-minded folks that has each others' interests and backs to support is a great way to not only learn but to build, gain and exchange trust with your peers. I have 3 or more people (and discussion boards) I can contact at any time of the day (really!) when trouble arises to get an instant answer. Plus, there is always the trusty search engine. But, there is an even more basic, fundamental problem that only recently has information technology begun to tackle. This being passwords. This has got to be the most vulnerable access point for the majority of login instances ever. Think about it. You just finished six months of review and in the sandbox with a new open-source collaborative communications system for your office staff. A central oasis of tools, functions and widgets that will excel productivity for the organization. Comes with a speed server software, powerful spam/virus blocker, ample security, ACL in such granularity it will prevent an flea from accessing any feature and so on. You also invested in two rack-mounted dual quad-core w/ 16gb of RAM powerhouse “pizza boxes” to boot and a new router. You're cranked up and ready to go! You give your staff the pre-training, the pre-launch training and the on-launch training. You set them up with their profiles and temporary passwords that are already randomly hardened with a combination of numbers, capital letters and punctuation symbols. After logging in for the first time they are instructed to change their temporary password. But, as you make your rounds to check in on how they are doing, you oversee a few logging in with their dog's name, the name of the org, the current year and make of their car, or even their birthday which is now seen by the millions of Facebook, MySpace, Friendster, Tribe, Twitter and who knows what other social networking profiles out there! I have little hair left on my head but that is hereditary but for you it could be diagnosed as latent onset of Trichotillomania. I get my calm from 30 years of T'ai Chi practice. But, I digress.
  • 3. There is an answer that could hold you over for the time being. Many web-based applications and SaaS products are beginning to adopt http://OpenID.net standards. This means one cryptic, difficult password for your staff to remember to log into many online websites. In fact, the password doesn't even get stored on the website and there is no way to trace it back. Yes, if there is keylogger malware that made it into a computer you could be tracked that way but this is a viable alternative. In addition, if you are a little more concerned (sorry cynics, this is way short of paranoia), keyed password certificates on a thumb drive could work, too. Security is always changing and evolving. It morphs this way and transmogrifies that way and reveals new cracks in the systems we use each and every day from our cellphones to ATMs to voting machines providing fertile ground for those with malicious intentions to infiltrate our data and productivity every day, if not, every second. It is not only a full time job but also though process gnawing at us with anxiety whether we are going to be the next victim of tampering. If you set up enough monitoring and preventive measures, even if you get a lot of port-knockers, any apparent breach will become very, very noticeable thus reducing your time in research as the culprit pops up on your screen or in a email notification, and in psychological therapy due to lack of sleep and excessive anxiety and delusional paranoia. There is no real protection anywhere in life. But, what you can do is prevent like learning a self-defense martial art by educating yourself enough and using powerful tools developed by trustworthy others that have direct meaning and service to your needs. Live long and prosper. ~ Spock Bruce M. Wolfe, has a masters degree in Social Work with an emphasis on Social Development and is the Chief Information & Technology Officer for http://MarinInstitute.org, an alcohol industry watchdog and president of vCampaign, Inc., developers of low-budget modern campaign websites. He is a 35+ year practitioner of a variety of martial arts of which most has been in the Chinese internal school.