The Art of Deception_ Controlling the Human Element of Security - Kevin D. Mitnick [165]
Explanation/Notes: Passwords can be easily recovered by an attacker if stored in unencrypted form in computer data files, batch files, terminal function keys, login files, macro or scripting programs, or any data files which contain passwords to FTP sites.
POLICIES FOR TELECOMMUTERS
Telecommuters are outside the corporate firewall, and therefore more vulnerable to attack. These policies will help you prevent social engineers from using your telecommuter employees as a gateway to your data.
16-1 Thin clients
Policy: All company personnel who have been authorized to connect via remote access shall use a thin client to connect to the corporate network.
Explanation/Notes: When an attacker analyzes an attack strategy, he or she will try to identify users who access the corporate network from external locations. As such, telecommuters are prime targets. Their computers are less likely to have stringent security controls, and may be a weak link that may compromise the corporate network.
Any computer that connects to a trusted network can be booby-trapped with keystroke loggers, or their authenticated connection can be hijacked. A thin client strategy can be used to avoid problems. A thin client is similar to a diskless workstation or a dumb terminal; the remote computer does not have storage capabilities but instead the operating system, application programs, and data all reside on the corporate network. Accessing the network via a thin client substantially reduces the risk posed by unpatched systems, outdated operating systems, and malicious code. Accordingly, managing the security of telecommuters is effective and made easier by centralizing security controls. Rather than relying on the inexperienced telecommuter to properly manage security-related issues, these responsibilities are better left with trained system, network, or security administrators.
16-2 Security software for telecommuter computer systems
Policy: Any external computer system that is used to connect to the corporate network must have antivirus software, anti-Trojan software, and a personal firewall (hardware or software). Antivirus and anti-Trojan pattern files must be updated at least weekly.
Explanation/Notes: Ordinarily, telecommuters are not skilled on security-related issues, and may inadvertently or negligently leave their computer system and the corporate network open to attack. Telecommuters therefore pose a serious security risk if they are not properly trained. In addition to installing antivirus and anti-Trojan Horse software to protect against malicious code, a firewall is necessary to block any hostile users from obtaining access to any services enabled on the telecommuter’s system.
The risk of not deploying the minimal security technologies to prevent malicious code from propagating cannot be underestimated, as an attack on Microsoft proves. A computer system belonging to a Microsoft telecommuter, used to connect to Microsoft’s corporate network, became infected with a Trojan Horse program. The intruder or intruders were able to use the telecommuter’s trusted connection to Microsoft’s development network to steal developmental source code.
POLICIES FOR HUMAN RESOURCES
Human resources departments have a special charge to protect employees from those attempting to discover personal information through their workplace. HR professionals also have a responsibility to protect their company from the actions of unhappy ex-employees.
17-1 Departing employees
Policy: Whenever a person employed by the company leaves or is terminated, Human Resources must immediately do the following:
• Remove the person’s listing from the on-line employee/ telephone directory and disable or forward their voice mail;
• Notify personnel at building entrances or company lobbies; and
• Add the employee’s name to the employee departure list, which shall be emailed to all personnel no less often than once a week.
Explanation/Notes: Employees who are stationed at building entrances must be notified