dentifying Vulnerabilities in Networked Systems

Ghosts in the machine. Spooks in the hard drive. It’s natural to worry about everything that can go wrong with the computers we work with – all the more so if those computers are part of a networked system. The arrival of the Information Age means that increasing amounts of critical business information are stored in such systems.

Surprisingly, though, many otherwise technology-savvy organizations still have a long way to go on the road to implementing appropriate security measures. IBM Corp. studies have pointed out that, while 86 per cent of companies in a recent survey used firewalls, 85 per cent had deployed antivirus software, and 74 per cent employed authentication procedures. Only 63 per cent of those surveyed used encryption software, and fewer than 50 per cent used intrusion detection technologies.

Those statistics point to the reality of vulnerabilities in networked systems, and to the inevitability of serious data loss incidents. Since data is often mission-critical to the successful business organization, the consequences can be significant.

Regardless of the cause of a data loss incident, the common denominator to system downtime is the high cost incurred. A survey in 2000 of 450 Fortune 1000 companies by the consulting firm Find/SVP found that the average outage across industries lasted four hours, at a cost of (US)$330,000. According to the survey, a typical company experienced nine outages per year, resulting in annual losses of almost (US)$3 million (excluding the cost of lost employee productivity).

Clearly, identifying and dealing with vulnerabilities is of critical importance. The first step in preventing unauthorized access to the network is the use of intrusion-detection technology, which can be defined as applications which actively monitor operating systems and network traffic for attacks and security breaches.

Intrusion-detection technologies come in two flavours: host-based systems, which use agents, and network-based systems, which use passive monitors. Host-based systems, which take a proactive approach, are deployed in the same manner as virus scanners or network management solutions – an agent is installed on all the system’s servers and a management console is used for reporting. Network-based systems sniff incoming traffic, comparing live traffic patterns to internal lists of attack signatures. Each approach has its own strengths and weaknesses.

In most cases, the cost of an intrusion-detection system can be justified for its forensic value alone. If a system is compromised and the logs are tainted, intrusion-detection system logs may save administrators days of digging.

But there are important steps that should be taken even before network intrusion systems are put in place. They’re based on technologically-savvy preparedness and old-fashioned common sense. What’s required is a strong foundation that can realistically improve security without wasting resources on ineffective security measures.

An appropriate disaster recovery plan is a basic prerequisite – this should be an overall strategy that addresses the technical and organizational factors involving security. That plan should begin with a comprehensive risk assessment analysis of the network, so that acceptable risk levels to the system and the organization can be determined. The results of that risk assessment analysis can then be used to develop and implement a suitable set of security policies and procedures to be used in guiding individuals and workgroups in the organization in the event of a network disruption. That information will allow decisions to be made as to which products and tools will be required by the organization to implement its security policies and procedures.

It’s not enough to simply buy “off the shelf” security software and distribute it to the organization’s systems administrators. That software’s configuration and management need not be tied directly to the particular security policies and procedures of the organization.

Ensuring adequate and appropriate network security is a long-term investment. And it’s an ongoing process, because at no pint can an organization say that every network vulnerability has been dealt with. There’s simply no such thing as “100 per cent secure.” However, the use of suitable network intrusion technologies, built around a carefully thought out business and technical security policy, will do wonders to give peace of mind – and allow the organization to go on doing business as it should.

Read More

The 1T Western Digital hard drive cannot detect the drive letter and the secondary recovery is successful

Case:Western Digital 1T hard disk, used under the Windows operating system, inserted into the computer, did not detect the hard disk, there was no response after power -on, and after the engineer’s test, the magnetic head was damaged, and the hardware was required to be replaced. Solution:The engineer evaluates the degree of damage to the…

Read More

32% of IT Professionals Have Lost Corporate or Private Data

Research by the portable storage and digital encryption firm revealed 57 percent also admit to carrying unencrypted data on USB sticks, portable hard drives or optical media, despite 98 percent acknowledging data loss to be a ‘serious and growing’ concern. Furthermore, 96 percent believe encrypted hard drives are preferable to unprotected drives for daily data use.

“The survey’s results are disappointing and alarming at the same time because our respondents should be setting a better example,” said John Michael, Managing Director of iStorage.

“Despite nearly all of the IT experts we questioned acknowledging data loss to be a serious and growing concern it seems many are not connecting that to their own data security procedures, with nearly a third admitting to losing a portable device containing confidential data. This is putting themselves and their organisations at risk.”

Read More

Special Requirements to use an Ultra DMA Hard Drive

Special Requirements to use an Ultra DMA Hard Drive Are there any special system or software requirements to use an Ultra DMA 33/66/100/133 ATA hard drive? Yes as follows:

  • To utilize the Ultra DMA (UDMA) capability of a hard drive, the system that the drive is being installed into must contain the appropriate hardware chipset and have the necessary software drivers installed. The system’s motherboard must be designed with a core logic chipset that provides the desired UDMA support. Also, it is the motherboard or system manufacturer’s responsibility to provide any additional software drivers that may be necessary to implement UDMA (Ultra ATA) operation.
  • Pentium II and newer motherboards and systems will typically contain some level of hardware support for UDMA operation (this could be UDMA 33, 66, 100, or 133 depending on the age of your system). It will be necessary to consult the system or motherboard manufacturer’s documentation to determine the level of UDMA supported by your particular hardware. For example if you install a new Maxtor hard drive capable of Ultra DMA/100 (UDMA mode 5), but your system is only capable of supporting Ultra DMA/33 (UDMA mode 2), you will only be able to achieve the Ultra DMA/33 performance. In this case you may want to consider upgrading your motherboard or purchasing an add-on PCI adapter, such as Maxtor’s Ultra ATA card, that is capable of supporting the latest Ultra DMA transfers. This is an inexpensive alternative to replacing your entire system or motherboard.

All Maxtor UDMA drives are fully backward compatible to earlier, non-UDMA systems. Just keep in mind that the transfer rate (performance) of your drive will be limited by the system’s capabilities and not necessarily by the hard drive.

  • Windows 95 (all versions), Windows 98 (all versions), and Windows NT 4.0 all have limited “bundled” driver support for UDMA operation. If you are attempting to use a hard drive capable of UDMA/66 or greater with one of these operating systems, you will more than likely need to obtain updated drivers for your system. It is best to always check with your system or motherboard manufacturer for UDMA driver requirements and availability. In some cases updated drivers may be available directly from Microsoft or from Intel if an Intel chipset is being used by your motherboard. Maxtor Corp. does not provide software drivers for UDMA operation since any required drivers are specific to the chipset and not the hard drive.
  • Windows ME, Windows 2000, and Windows XP all have expanded “bundled” driver support for UDMA operation and may already contain the necessary driver support. Updated drivers may or may not be required depending on your motherboard’s chipset. Once again, it is always best to check with the system or motherboard manufacturer for driver requirements. A good resource for Ultra ATA drivers for systems with Intel based chipsets is at the following site: support.intel.com/support/chipsets/storagedrivers/ultraATA.
  • For systems and hard drives which have all of the prerequisites for UDMA mode 3 and greater (UDMA/66 and faster), a special 80 conductor, 40-pin interface Ultra ATA interface cable is required. The 80 conductor cable reduces cross talk and improves signal integrity by providing additional ground lines between the 40-pin ATA signal and ground lines. Due to the higher transfer rates and shorter cycle times of UDMA data transfers, this cable is required for UDMA/66, UDMA/100, and UDMA/133 operation. It is also highly recommended for UDMA/33 operation as well to help prevent any possible noise related issues.

All Maxtor Retail Kits that contain a UDMA/66 or greater hard drive will also include the 80-conductor Ultra ATA interface cable. This Ultra ATA Interface Cable conforms to the ANSI Specifications.

Read More