D-Link DFL-2500 User Guide - Page 30

Attacks on Insecure pre-installed Components, Inexperienced Users on protected Networks, Data-Driven - review

Page 30 highlights

3.2. What does a Firewall NOT protect against? 11 3.2.1 Attacks on Insecure pre-installed Components A very common problem is the fact that operating systems and applications usually contain insecure pre-installed components. Such components include undocumented services present on computers connected to the Internet, allowing inbound external network connections. One example of this form of vulnerability is the "simplifying" components that allow direct ODBC access via HTTP in web servers. The common feature of most of these components is that they are not intended for use on a public network, where intruders can utilize the extra functionality at hand to easily break into the system. However, modern systems are frequently supplied with such components pre-installed in order to make the system easier to use. A good precaution to take is to review all Internet-connected systems, clients and servers, and remove all unnecessary functionality. 3.2.2 Inexperienced Users on protected Networks No firewall in the world can protect against the damage that inexperienced users can do to a protected network. If they "assist" an intruder in one way or another, e.g. by opening an unrecognized program sent to them by email such as "merryxmas2001.exe", they can do more damage than all the bugs in applications and operating systems put together. All attempts to secure the networks of an organization should be preceded by a thorough investigation of what should and should not be permitted. The result of this should be a security policy that applies to all parts of the organization, from management down. In order for such a policy to work, all users must be made aware of this policy and why it must be enforced. 3.2.3 Data-Driven Network Attacks Normally, a firewall will only protect a system against data-driven attacks in exceptional circumstances. Such attacks include: • HTML pages containing javascript or Java that attack the network "from the inside" when the page is viewed in a browser or e-mail program. The only possible protection against this sort of attack, D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

3.2. What does a Firewall NOT protect against?
11
3.2.1
Attacks on Insecure pre-installed Components
A very common problem is the fact that operating systems and applications
usually contain insecure pre-installed components. Such components
include undocumented services present on computers connected to the
Internet, allowing inbound external network connections. One example of
this form of vulnerability is the ”simplifying” components that allow direct
ODBC access via HTTP in web servers.
The common feature of most of these components is that they are not
intended for use on a public network, where intruders can utilize the extra
functionality at hand to easily break into the system. However, modern
systems are frequently supplied with such components pre-installed in order
to make the system easier to use.
A good precaution to take is to review all Internet-connected systems,
clients and servers, and remove all unnecessary functionality.
3.2.2
Inexperienced Users on protected Networks
No firewall in the world can protect against the damage that inexperienced
users can do to a protected network.
If they ”assist” an intruder in one way or another, e.g. by opening an
unrecognized program sent to them by email such as ”merryxmas2001.exe”,
they can do more damage than all the bugs in applications and operating
systems put together.
All attempts to secure the networks of an organization should be preceded
by a thorough investigation of what should and should not be permitted.
The result of this should be a security policy that applies to all parts of the
organization, from management down. In order for such a policy to work,
all users must be made aware of this policy and why it must be enforced.
3.2.3
Data-Driven Network Attacks
Normally, a firewall will only protect a system against data-driven attacks
in exceptional circumstances. Such attacks include:
HTML pages containing javascript or Java that attack the network
”from the inside” when the page is viewed in a browser or e-mail
program. The only possible protection against this sort of attack,
D-Link Firewalls User’s Guide