D-Link DFL-2500 User Guide - Page 32

Internal Attacks, Modems and VPN Connection

Page 32 highlights

3.2. What does a Firewall NOT protect against? 13 • Customized scripts on web servers. It is now very easy to extend the functionality of your web server by writing small, customized programs to handle a multitude of tasks. However, insufficient awareness of potential problems can lead you, more often than not, to make small, difficult to detect mistakes that will enable an intruder to gain access to your system. • Web browsers. Automation of processes and simplifying operations for the benefit of users creates increased internal complexity and thereby increased risks of vulnerabilities. • Desktop software, primarily that which to great extent support scripting languages, for the same reason as browsers. Scripting languages provide almost unlimited access to local computers and all connected network resources. As a result, intruders can cause all types of problems if they can get internal users to open documents containing malevolent scripts. 3.2.4 Internal Attacks A firewall can only filter data that passes through it. Therefore it can't offer any protection from internal attacks on local networks, where all computers communicate directly with each other. In addition, firewalls cannot provide protection against local users introducing harmful software to the network from a removable media, or by exporting sensitive information in the same manner. This may seem obvious. However, most people underestimate the impact of such damage. Although different sources provide different figures, it is clear that more than 50% of all data security problems are the results of internal attacks. Some sources put this figure as high at 80%. 3.2.5 Modems and VPN Connection A common misconception is that modems and VPN gateways are as secure as the protected network and can be connected directly to it without protection. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

3.2. What does a Firewall NOT protect against?
13
Customized scripts on web servers. It is now very easy to extend the
functionality of your web server by writing small, customized
programs to handle a multitude of tasks. However, insufficient
awareness of potential problems can lead you, more often than not, to
make small, difficult to detect mistakes that will enable an intruder to
gain access to your system.
Web browsers. Automation of processes and simplifying operations
for the benefit of users creates increased internal complexity and
thereby increased risks of vulnerabilities.
Desktop software, primarily that which to great extent support
scripting languages, for the same reason as browsers. Scripting
languages provide almost unlimited access to local computers and all
connected network resources. As a result, intruders can cause all
types of problems if they can get internal users to open documents
containing malevolent scripts.
3.2.4
Internal Attacks
A firewall can only filter data that passes through it. Therefore it can’t
offer any protection from internal attacks on local networks, where all
computers communicate directly with each other.
In addition, firewalls cannot provide protection against local users
introducing harmful software to the network from a removable media, or by
exporting sensitive information in the same manner.
This may seem obvious. However, most people underestimate the impact of
such damage.
Although different sources provide different figures, it is clear that more
than 50% of all data security problems are the results of internal attacks.
Some sources put this figure as high at 80%.
3.2.5
Modems and VPN Connection
A common misconception is that modems and VPN gateways are as secure
as the protected network and can be connected directly to it without
protection.
D-Link Firewalls User’s Guide