There is built in security where traditionally a companies network has evolved using leased lines and
proprietary protocols. It is not easy for a potential hacker to get at the data. Today TCP/IP is
implemented in the vast majority of organisations, deploying open systems and common standards. This
has great advantages but with it comes additional security risks.
organisation needs to decide where it positions itself between the two
extremes of total security and total access. A policy needs to
articulate this, and then define how that will be enforced with the
correct practices. This policy where appropriate should include control
of back- up information and a disaster recovery plan.
To protect your company information there are many things to consider. How does an attacker gain
access to your equipment? Is physical access an issue? What are your connections to the outside world?
Is there Internet access? Are there dial-up connections?
Security violations generally fall into one of the following categories:-
• Wire tapping, gains access to data and passwords
• Impersonation, allows unauthorised access to emails or other documents
• IP Spoofing, allows access to networks that rely on IP address filtering
• Denial of Service attacks, renders network non-functional
• Guessing of passwords, using e.g. dictionary attacks
• Guessing keys, gets access to encrypted data
• Viruses, allows the attacker to destroy data and disrupt system operation
It is important to have in place security measures that will minimise or prevent exposure to these types of
attacks especially in today’s environment where e-commerce and wireless LANs are playing a greater
role in the way business is conducted.
Makom will take the time to understand your organisation’s security policy, and can design and build a
security architecture that best implements that policy. Other issues like services required, convenience,
and scalability will factor in to the final design. We will advise on what technologies to apply and where,
including, Firewalls, IP filtering, proxy servers, content checking, certificate administration, SOCKS,
RADIUS, PAP/CHAP, TACACS, SSL, IPSec, IPv6, NAT, PPP and others.