Home page logo
/

basics logo Security Basics mailing list archives

Re: Secure Network | Requirements
From: Kurt John <kurt.md.john () gmail com>
Date: Tue, 19 Apr 2011 08:35:00 -0700

Hey Muhammad,

One solution is to get yourself a VM of the operating system that's
commonly in use in your environment. You can then test how the data
will operate in your environment. Once you copy it onto your VM you
can then run the necessary scans. If the data is intended to be used
in a particular program then you can install the program on the VM as
well. I know licenses can get expensive for some programs but it
sounds like management is committed to security so they should really
mind a little extra money

Oh two more things. First, make sure that you revert to a snapshot
after every test. This is to ensure that there is no damage from prior
tests. Also, its the best representation of your production
environment since it is super secure :-)

Second, ensure there is no networking enabled on your virtual machine.
If there are viruses, trojans and the like in this data that you will
be testing prior to production you don't want any inadvertent escape
via bridged, NAT or even host connections. It should be standalone as
much as is possible.

I hope this helps

Kurt John
CISA, C|EH, CPT

On Sat, Apr 16, 2011 at 7:47 AM, Muhammad Aslam <aslam.popal () gmail com> wrote:
All

I would like to know whether anyone have had any solution for the
following scenario and also need to have an insight on best practices
in security industry


I have setup a network where the management has requested to block all
kind of access to the network by means of blocking USB, CD-Drives as
well filtering internet by blocking all ports except for the needed
ones ( even file sharing)

So in this scenario i have one section who commonly bring data from
outside and all the data is whether on their cell phones or thumb
drives and those media are not secure and also not properly maintained
in terms of viruses / trojans so would like to what is the best
practice in this scenario to copy such data to the network ? and also
has anyone implemented such setup , please share your experiences ?


Regards

-Aslam

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, 
how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, 
purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for 
set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital 
certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------



------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault