Server Security: A Reality Check
نویسنده
چکیده
Server security is paramount to any organization. All too often, network defenses focus entirely on the perimeter, leaving networks looking like pieces of candy—having a hard outer shell and a soft gooey inside. In today's threat landscape, defenders must operate under the presumption of compromise. Attacks involving spearphishing, social engineering, weak bring your own device (BYOD) security, poor physical security of end user equipment (for example, traveling laptops) and user carelessness contribute to the initial compromise of user endpoints. Once user endpoints are compromised, attackers typically use these as stepping off points to compromise other network assets. The ultimate goal of most attacks on corporate infrastructure is theft of intellectual property (IP) and confidential customer data, such as personally identifiable information (PII), payment card information (PCI) and personal health information (PHI). Throughout this paper, the term IP will be used to represent all classes of sensitive data that organizations are required to keep confidential. However, IP is not normally stored on end user machines (and even when it is, it isn't concentrated there). Attackers know that IP is stored on the organization's servers. These servers are typically well protected from external threats, but once an attacker compromises a single endpoint, perimeter defenses are rendered moot. The attack can now proceed from the vantage point of an insider. Because of the sheer number of user endpoints, with various configurations (and vulnerabilities), a wise network defender must architect server defenses assuming that one or more of the endpoints in the environment has been already been compromised.
منابع مشابه
Remote Data Integrity Check and Data Uploading Using Client and Server Proxies
Large number of clients like to store data onto public cloud server (PCS) due to increase in advancement in cloud computing. As a result the new security problems are in need to be solved to help large number of clients in processing their data on public cloud servers. When the clients are not allowed to access the public cloud servers, they will be forwarded to proxy servers to process their d...
متن کاملA New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy
Hwang and Li proposed the first remote user authentication scheme using smart cards to solve the problems of Lamport scheme. Unfortunately, Hwang and Li’s scheme has some security weaknesses. First, ChanChang, ShenLinHwang and then Chang-Hwang pointed out some attacks on Hwang – Li’s scheme. This paper presents a new remote user authentication scheme with forward secrecy, which provides forward...
متن کاملRemote Integrity Check with Dishonest Storage Server ? Ee - Chien
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server, by adapting the challenges and responses, tries to discard partial information of x and yet evades detection. Besides the security requirements, there are considerations on communication, storage size and computation...
متن کاملModeling Security-Check Queues
Motivated by the waiting lines between the US-Canadian border-crossings, we investigate a security-check system with both security and customer service goals. In such a system, every customer has to be inspected by the first stage inspector but only a proportion of customers need to go through the second stage for further inspection. This "further inspection proportion", affecting both security...
متن کاملRemote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server, by adapting the challenges and responses, tries to discard partial information of x and yet evades detection. Besides the security requirements, there are considerations on communication, storage size and computation...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015