Security Basics mailing list archives
Re: Secure Network | Requirements
From: Kurt John <kurt.md.john () gmail com>
Date: Tue, 19 Apr 2011 08:35:00 -0700
Hey Muhammad, One solution is to get yourself a VM of the operating system that's commonly in use in your environment. You can then test how the data will operate in your environment. Once you copy it onto your VM you can then run the necessary scans. If the data is intended to be used in a particular program then you can install the program on the VM as well. I know licenses can get expensive for some programs but it sounds like management is committed to security so they should really mind a little extra money Oh two more things. First, make sure that you revert to a snapshot after every test. This is to ensure that there is no damage from prior tests. Also, its the best representation of your production environment since it is super secure :-) Second, ensure there is no networking enabled on your virtual machine. If there are viruses, trojans and the like in this data that you will be testing prior to production you don't want any inadvertent escape via bridged, NAT or even host connections. It should be standalone as much as is possible. I hope this helps Kurt John CISA, C|EH, CPT On Sat, Apr 16, 2011 at 7:47 AM, Muhammad Aslam <aslam.popal () gmail com> wrote:
All I would like to know whether anyone have had any solution for the following scenario and also need to have an insight on best practices in security industry I have setup a network where the management has requested to block all kind of access to the network by means of blocking USB, CD-Drives as well filtering internet by blocking all ports except for the needed ones ( even file sharing) So in this scenario i have one section who commonly bring data from outside and all the data is whether on their cell phones or thumb drives and those media are not secure and also not properly maintained in terms of viruses / trojans so would like to what is the best practice in this scenario to copy such data to the network ? and also has anyone implemented such setup , please share your experiences ? Regards -Aslam ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- Secure Network | Requirements Muhammad Aslam (Apr 19)
- Re: Secure Network | Requirements Mark (Apr 19)
- RE: Secure Network | Requirements De Lopez, Didier (Apr 19)
- Re: Secure Network | Requirements John Morrison (Apr 19)
- Re: Secure Network | Requirements Todd Haverkos (Apr 19)
- Re: Secure Network | Requirements Kurt John (Apr 19)
- Re: Secure Network | Requirements Charlie Clark (Apr 19)
- Re: Secure Network | Requirements Bill Kuhn (Apr 19)
- <Possible follow-ups>
- Re: Re: Secure Network | Requirements neeraj_gaurav (Apr 20)
- Re: Secure Network | Requirements Mark (Apr 19)