Prevent unwanted access by intruders

INTEGRATED SECURITY
VIRUS PROTECTION
Symantec™
Client Security
Business Pack*
Symantec™ Client Security Norton Internet Security™
Small Office Pack
with Groupware Protection
Business Pack
Norton™
Personal Firewall
Small Office Pack
Norton
AntiSpam™
Small Office Pack
Firewall – intrusion protection
against hackers
Norton AntiVirus™
Small Office Pack
Symantec AntiVirus™
Business Pack*
Symantec AntiVirus™
with Groupware Protection
Business Pack
Symantec AntiVirus™
Multi-Tier Protection
Business Pack*
Removes viruses automatically
without interrupting your work
Scans and cleans email
Privacy protection
– blocks confidential information
from being sent
Blocks new script-based viruses and prevents
worms from spreading
Protects against new viruses
with automatic updates
Stealth mode – makes PCs
invisible to other Internet users
Ad blocking
Scans and cleans
instant messages
Filters spam and unwanted
email content
Virus protection for desktops
Virus protection for servers
Content filtering
Virus protection for Microsoft Exchange®
and Lotus Domino® email servers
Controls workgroup Internet access on a
small network
Virus protection for SMTP gateways
Virus protection for desktops
* Also available via the Value License Program
Virus protection for servers
Virus protection for Microsoft Exchange®
and Lotus Domino® email servers
Updates automatically
to protect against new threats
* Also available via the Value License Program.
SECURITY APPLIANCES
PROBLEM SOLVING
SymantecTM Gateway Security 320
Firewall
Virtual Private Networking (VPN)
SymantecTM Gateway Security 360 and 360R
Stateful firewall that inspects at the IP and circuit layers
Gateway-to-gateway,
client-to-gateway and VPN-passthrough
Gateway-to-gateway, client-to-gateway and
VPN-passthrough 360R - includes 10 client-to-gateway licenses
Norton™ SystemWorks Premier
Small Office Pack
Supports encryption using DES, 3DES and AES.
IPsec
Intrusion prevention
Gating - blocks a specific detected event from passing through the firewall
Intrusion detection
Signature-based intrusion detection
Antivirus protection
Antivirus policy enforcement - appliance constantly queries network entities and remote users
to ensure antivirus is running and blocks or warns if not
Content filtering
Removes viruses automatically
without interrupting your work
Two user-definable URL lists (allow and deny), maximum of 100 entries each
Restores your PC to its
previous working state
Antispam
Standalone web-based management
High Availability
Scans and cleans email
Blocks new script-based viruses and
prevents worms from spreading
Yes
Yes
via external modem
via external modem or second WAN port
Monitors your PC continuously to
identify problems before they occur
Wireless access point security
Maximum recommended users / nodes
Maximum firewall throughput
VPN (DES, 3DES, AES) and WEP
VPN (DES, 3DES, AES) and WEP
50
100
55 Mbps
60 Mbps
Removes old software applications
and other unneeded files
broad range of software, appliances and services designed to help
individuals, small and mid-sized businesses, and large enterprises
secure and manage their IT infrastructure. Symantec's Norton
brand of products is the worldwide leader in consumer security
and problem-solving solutions.
Headquartered in Cupertino, Calif., Symantec has operations
in more than 35 countries. More information is available at
www.symantec.com.
IT Security for Small Businesses
Creates backup disks, restores files quickly
and clones one hard drive to another
Stores confidential passwords
and credit card numbers
Symantec is the global leader in information security providing a
▼
Optimises file storage
Load Balancing and throughput aggregation via dual WAN ports
Load Balancing
Prevent unwanted
access by intruders
About Symantec
IT Security for Small Businesses
Intrusion detection
Unfold this section to find out about Symantec's IT security products that can help to protect your business
Compare Symantec's IT security solutions to find which one
best suits your business.
Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation.
Copyright © 2004 Symantec Corporation. All rights reserved.
All product information is subject to change. 09/04
Prevent unwanted
access by intruders
Prevent unwanted
access by intruders
IT Security for Small Businesses
The book ”Prevent unwanted access by intruders. IT Security for Small Businesses” has
been produced by the marketing department of Symantec Nordic AB in collaboration with
Kundskaparna AB.
Project Coordinator, Symantec Nordic: Helene Ruda
Project Manager, Symantec Nordic: Michael Skärbo
Project Coordinator, Kundskaparna: Niclas Norling
Layout & design: Kundskaparna
Text: Bertil Myhr, Hedberg & Co. Helene Ruda and Joakim von Braun, Symantec Nordic
Editing: Lars Strömqvist, Kundskaparna. Guy Clapperton
Photography: Mats Åsman, noart.nu
Artwork: Tomas Öhrling/Info AB and Tove Hennix
Market survey of small businesses: Dynamic Markets. Vanson Bourne
Typography: SymantecSans, SymantecSerif, Webdings
Paper, binding: Geltex 130 g
Paper, end paper: Kaskad yellow 120g
Paper, insert: Lessebo linné, white 120g
Paper, dust cover: Lessebo linné, white 150g
Print and repro: Kristianstads Boktryckeri AB
Print run, first edition: 11,000 copies in Swedish, Norwegian, Danish, Finnish and English
For the UK book, special thanks to: Katherine James, Symantec UK Ltd.
ISBN 91-631-5906-6
Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation.
Other brands and products are trademarks of their respective holder(s).
Copyright © 2004 Symantec Corporation. All rights reserved. 09/04
www.symantec.co.uk
Contents
Foreword
The Company IT Environment
Wired networks
Wireless networks (WLAN)
7
Protection against Data Loss
39
UPSs and backup power
39
9
Backup routines
39
9
Backups
40
10
Protection against Intrusion
Computer room
12
Internet connection
13
and Malicious Software
43
Remote working
15
Firewall
43
Remote working on home computers
17
Hardware-based and software-based firewalls 44
Remote working on laptop computers
18
Firewall principles
45
Antivirus
46
21
Intrusion detection
47
Viruses
22
User IDs and access control
48
Worms
23
Encryption
49
Trojan horses
24
Digital signatures
50
Blended threats
25
Passwords
51
Email threats and junk mail
26
Virtual private networking (VPN)
54
Internal threats
28
Vulnerability analysis
57
Misuse of the company’s IT resources
28
Threats to Information Security
Security Products for Small
Security Rules
Designing security rules
31
31
Seven steps towards an effective
security regime
32
Contingency plan
34
Training staff
37
and Medium-Sized Companies
59
M
any small businesses struggle with security on their computer systems.
Actually that’s not quite true. Many small businesses struggle with cash
flow, they agonise over when the next payment is going to be made, why
their cash flow is so appalling, why their larger customers think an invoice paid
within 90 days is acceptable instead of the 30 they agreed. They don’t have time to
think of security in any depth – if there’s an antivirus programme loaded on every
PC in the office, that’s that.
Except of course it’s not. If you install an antivirus programme on day one and
someone writes a new virus on day two, you’re stymied if you didn’t know you had to
keep the thing up to date. If someone steals your laptop and knows or guesses your
password correctly, your customer information is available to whoever has the
machine. Those are just the things that can happen deliberately. Your staff might
install their own software on a computer you’ve provided in their home, thinking
that’s OK – or they’ve picked the word ‘password’ as their password (no kidding,
I once worked a few days at a computer magazine where the editor had done just
that; I was into her system within seconds). Hopefully you have an IT manager to
put a policy in place, but how do you make sure everyone knows about it, and what
happens if they don’t?
There’s no simple answer to a lack of resources, or the need to keep all of your
data safe when there’s no IT manager to help. But in breaking the issues down into
comprehensible chunks and therefore making people aware of the issues, and
offering practical, simple advice as to how to surmount the problems involved,
Symantec’s made a good start with this booklet.
Guy Clapperton
2004
Guy Clapperton is editorial associate and columnist to The Guardian’s Business
Solutions section. He also contributes to The Times, The Observer, The Financial
Times and Arena on business and IT issues.
7
8
The Company IT Environment
Wired networks
Almost all offices with more than a couple of staff have a local
area network, which is used to link PCs, servers, printers and
communication devices. Traditionally, this consists of a twisted
Remote
pair cable in a star-shaped network: a cable is laid from a
central connection point, often close to the computer room,
to all PCs, printers and other peripheral devices.
There have been many technologies for local area networks,
but nowadays Ethernet is used almost exclusively. Despite
being the oldest principle used in local area networking,
Ethernet has proved to be better at adapting to technological
Internet
developments than all of the alternatives – the same principle
is still used in the latest wireless networks. The speed (bandwidth) of a cable-based local area network is usually 100 Mbps,
but a variant ten times faster known as Gigabit Ethernet is
gaining ground, particularly for connecting servers and
Gateway
network devices that need the high capacity offered.
File Server
Mail Server
Desktop
9
Wireless networks (WLAN)
WLAN (Wireless Local Area Network) is a technology that is
developing very rapidly, alongside the falling price of the
equipment. Most of the cabling is replaced by wireless
connections with approximately the same range as an
ordinary local area network, which is usually up to 100
metres. Communications are routed between base stations,
often called access points, and network adapters on the PC.
However, other companies in your vicinity have the same
right so performance and functionality can be affected if
several wireless networks are installed in close proximity to
each other without coordination.
Whereas on paper WLAN is slower than a cable-based
local area network, in practice few users will notice any
difference. A generation shift is now underway with WLAN
devices increasing their maximum network speed from 11
Mbps to 22 or 54 Mbps.
From the point of view of security, WLAN is a more
problematic solution than a cable-based network. As traffic
is passed over radio frequencies, it is susceptible to virtual
eavesdropping. In principle, the radio frequencies used by
wireless local area networks can be used freely, which has
both advantages and disadvantages. The advantage is that it
is possible to install a network without requiring permission
or paying charges. However,the fact that all the other companies in your vicinity have the same rights so performance and
functionality can be affected if several wireless networks are
installed in close proximity to each other without coordination. Microwave ovens and other wireless transmissions can
also disturb WLAN traffic.
It is vital to ensure that a WLAN is secured properly. Even
if the incorporated security is not perfect, it is of course better
than no security at all. The integrated WEP encryption (Wired
10
Equivalent Privacy, a security protocol for wireless local area
networks) is easy to crack, and many simple programs can be
downloaded from the Internet that do so automatically.
A minimum requirement for WLAN security is that
information pertaining to user identification (authentication)
is transmitted in encrypted form. Companies that have been
considering setting up a VPN solution (virtual private network;
see page 52), would be well advised to implement such plans at
the same time as setting up a wireless network. By using VPN,
you can shut out unwanted listeners.
Base Station
Network Adapter
11
Computer room
A typical IT environment in a smaller office might look like the
Did you know that...?
one in the picture. A small computer room with a few server
Of the 50 worst cases of
computers: one server for storing files and shared applications,
malicious code during the
one for email and one for the website. The file server is connec-
first half of 2003, 19 used
ted to a UPS (Uninterruptable Power Supply) unit for backup
file sharing services and
power. The same room often also houses the main data com-
instant messaging applications to propagate themselves. This represented an inc-
munications equipment, for example a router for connecting
to the Internet and other external communications, a switch
for the local area network, a firewall and occasionally some
additional systems for network security.
In other words, the computer or server room houses the
rease of almost 400 per cent
main office IT systems, and vast quantities of important infor-
in only a year.
mation pass through or are stored there. Therefore, physical
security has to be a consideration. The door to the computer
or server room must be locked, the room must not be used
for other purposes, and only authorised people with tasks
Switch
Firewall
Router
File Server
12
Email Server
Web Server
requiring access must be permitted to enter the room.
Another sensible security policy measure is to arrange for the
WIRELESS NETWORKS
cleaning of the computer room to be supervised and not be
carried out in the evenings at the same time as the rest of the
premises.
Never use pre-loaded settings.
Enable WEP (Wired Equivalent
Privacy, a security protocol for
Internet connection
External threats to information security really become an
issue when the internal IT environment is opened up to the
outside world. This is almost always related to connection to
the Internet so we will concentrate on this when looking at
what you can do. However, it is worth bearing in mind that
wireless local area networks)
and regularly change the
encryption keys.
Position the access points
centrally in the building.
Restrict the connection between
the same technology that is used on the Internet applies
the wireless network and the
equally in a sealed, internal company context.
ordinary network, and install an
Firewalls and antivirus software are the most important
components in protecting against external threats. If you
extra firewall.
Be wary of visitors – a palmtop
connect to the Internet without both of these protective
computer with WLAN is easy to
measures in place, you will be exposing yourself to entirely
lose.
unnecessary risks and may be putting your company’s very
Educate the users.
existence on the line.
Restrict physical access to the
A company wishing to connect its local area network to
the Internet can choose from a range of different services and
technical solutions.
access points.
Block and penalise unauthorised
access points.
Fixed digital line
A ‘fixed line’ is the most expensive but quickest way to
communicate externally. The service provides permanent
connection with fixed bandwidth. You can often specify the
capacity of the fixed line yourself – the faster the line, the
more expensive it is. Over the last few years the price of fixed
lines has fallen rapidly.
13
ADSL
ADSL (Asynchronous Digital Subscriber Line) is a collective
name for dialup data connections that utilise ordinary telephone lines for digital transmission but offer higher speeds.
ADSL does not have the same capacity in both directions. The
speed of data received is several times greater than that for
data transmitted by the user. This is well suited to the needs
of individual users, for example when surfing the web, where
significantly more data is received than is sent. However, your
company might not have the same requirements, for example
if you needed to upload a lot of large files.
ISDN
ISDN (Integrated Services Digital Network) is an older dialup
service that utilises ordinary telephone lines for digital transmission. A standard ISDN subscription gives you two channels
of 64 Kbps each. Two or more ISDN subscriptions can be
coupled in parallel, making them appear as a single connection
with higher capacity. ISDN is losing popularity today as ADSL
services are rolled out.
Modem
An ordinary telephone modem may be enough to provide a
single user with an Internet connection or remote connection
to the local area network at the office, but modems are slow.
Another reason to drop this old type of modem communication
is that it is becoming more expensive than modern digital
network services, particularly if a modem is used by many staff
who are connected for long periods of time.
14
Remote working
Remote working with computer support is becoming all the
more common, and this has been helped by by improved
communications. As remote working often requires opening
internal systems for communication with the outside world,
several important security issues arise that must be reviewed
thoroughly.
Generally it is difficult to maintain the same high level of
security at a remote PC as in the office. You need to reduce
exposure to security threats and the possible consequences of
remote working, rather than trying to emulate the protection
levels in place at the office. First and foremost, the amount
of important data saved and stored on a laptop or home
computer should be minimised.
The most fundamental consideration is that the computer
you are working from is in line with to the company’s security
policy as regards installed security technology. The type of
security you need depends on the type of remote working – do
you need access to the entire office’s IT resources, or do you
just need email? Are you using a laptop computer, or are you
working from a home computer?
15
SECURE REMOTE WORKING
Inform staff that the company’s security policy
also applies when working remotely.
Ensure that everyone working remotely has
the right technology installed on their
General precautions
• Be careful with confidential material;
• Do not allow other family members to use
your work computer;
computer. For remote working, it is essential
to have antivirus software, a personal
(distributed) firewall, and VPN functions
unlocked. Always ensure that the password-
allowing you to log on to the company’s
protected screensaver is on when you are not
network securely. Bundled solutions are now
using the computer;
available that comprise all this functionality
• Be especially attentive when you are in
(e.g. Symantec Client Security for Small
airports or hotels. Ensure that your
Business).
computer is out of sight and locked away;
Establish rules on how employees should
manage remote working, e.g.:
• Not working with company information on any
computer other than a work computer;
• All connections to the company network must
be via VPN;
•
• Never leave your computer unattended or
• If anyone steals your computer, immediately
inform the IT manager and your boss;
• If you download programs or files from the
Internet, check through them before installing
them;
• Do not install software that you do not have
The computer must be protected with both
a licence for. Check that the company has
antivirus and a personal firewall.
approved the program you want to install
before you do so.
16
Communication is a weak link whenever someone is working
away from the office. Dialup modem connections are still
commonly used to connect remotely. Often in an office,
several modems are connected in a group to the local area
network. A simple and effective measure for raising the
security level is call-back, where users first dial up and identify
themselves, and are then disconnected. The modem at the
office then automatically calls back the (approved) number
Did you know that...?
In May 2000, the LoveLetter
worm appeared. The worm
where the remote worker is located, after which work can
sent itself to the addresses in
begin. Modem traffic is also relatively simple to encrypt.
the MS Outlook address book.
Increasingly, modem traffic is being replaced by other,
higher capacity network services. The natural solution in
many cases is to use VPN technology (Virtual Private
Networking) to create secure connections over the Internet.
It overwrites files on local and
network drives, attaches and
hides files, and attempts to
This requires special software to be installed on each
download a Trojan to steal
connected computer.
passwords. LoveLetter managed to spread so successfully
Remote working on home computers
Home computers are often shared by the whole family. This
differing usage can cause problems, such as an increased
because users believed they
were receiving an email love
letter.
threat from viruses and intrusion. Therefore it is a good idea
to separate home and work computers completely at home too,
and this principle is becoming even easier to implement as
prices fall. However, those responsible for information security
cannot rely on such a principle entirely, as it is impossible to
check whether it is being adhered to.
It is often hard to set limits on what constitutes private use
– for example, there are few employers who would think of
banning short family email messages to and from the work
address. Nevertheless, every company asking its employees to
work remotely needs to put in and enforce some guidelines on
how its technology may be used.
17
Remote working on laptop computers
Remote working and laptop computers go hand in hand. An
increasingly common variant is for laptops to completely
replace desktop computers at the office, and for laptop
computers to connect to the office local area network using
docking stations at every desk. Docking helps to make a
laptop more comfortable to use by connecting it to a proper
keyboard and larger screen.
This is a practical solution, but also the most problematic
from a security point of view. Laptop computers are easier
to steal, can be lost, and expose the company to a far greater
risk of losing vital information than systems that remain
within the company’s four walls the entire time. Therefore the
18
requirement to backup data becomes even more important, as
does the need to work in a way that reduces risk. For example,
it may be possible that staff can connect remotely and work
on the server at the office the whole time. In this case, they
should save their files there rather than just on their own
computer. If this isn't possible, another possibility is to
synchronise the content of the local hard disk with the server
or with the PC at the office afterwards.
One alternative that provides a higher level of security
than laptop computers is to use removable hard disks, so that
only the hard disk needs to be taken out of the office.
Removable hard disks are less susceptible to theft and easier
to keep secure. Another type of portable data memory that is
quickly gaining in popularity is 'flash memory' that connects
to a computer's USB port. The rapid development of memory
chips with ever greater capacity means that they can now
store over a gigabyte in a format that easily can fit in a
pocket. Memory sticks have no moving parts and are therefore more durable than removable disks but there are security
implications. Portable memory must be scanned for viruses
and worms in the same way as other local and network drives.
19
20
Threats to Information Security
Who is a threat?
‘Hackers’ and ‘crackers’ are the two terms usually used to label
those involved in computer intrusion. However it is easy to use
the neutral term 'intruder' regardless of who is trying to get
into your systems.
Most intruders scan large parts of the Internet searching
for systems that are vulnerable. When they find them, they gain
entry very easily, regardless of whether it is to an international
organisation or a small mechanic’s workshop. Don't kid yourself
that you can avoid attack just because your company is small
and unknown. Everyone is affected to the same extent.
It is difficult to lump all intruders together, as they have
such disparate aims. Many intrusions are carried out more or
less for a laugh, or in any case not with the aim of damaging
the system itself. There are various examples of cases where
intruders have sabotaged the websites of well-known companies
or public authorities and replaced the home page with a web
page poking fun at the organisation for its poor security or
other alleged shortcomings.
Intrusions where money is the direct motive are uncommon,
but on the other hand, it is this type of intruder that can cause
the greatest damage to a company.
Information security is a matter of protecting against
internal threats just as much as against external ones. These
might include users who are authorised but who exceed their
authority and come across sensitive or valuable information.
21
Viruses
When information security is brought up, viruses always
enter into the discussion, but this was not always the case.
Viruses were a theoretical threat from the very beginning, but
there was a time when experts actually debated whether or
not what would become known as viruses could pose a real
danger to systems and networks.
However, the debate was concluded in 1984 when the
researcher Fred Cohen coined the very term computer virus.
He presented an experiment proving that harmful computer
viruses were a realistic possibility. According to Cohen, a
computer virus is a program that ‘infects’ other programs
by modifying them so that they contain a copy of the virus
program. In other words, it is a program that can reproduce
Did you know that...?
itself.
As early as the late 1980s, viruses were a nuisance factor
At the height of its spread,
for computer users. To begin with, they spread through files
the Blaster worm was infec-
on infected diskettes. In 1995, the first macro virus appeared,
ting as many as 2500 compu-
which exploited macro functions in common programs,
ters every hour. Worms are
spreading increasingly rapidly, resulting in overloaded
particularly the word processor Word. They spread through
infected Word files, and could infect users of both PCs and
Macintoshes.
When viruses began to be combated systematically by
networks, sluggish network
antivirus utilities, virus writers fought back by developing
traffic and blocked Internet
polymorphic viruses that alter appearance when they are
access.
copied. However, this problem was solved rather quickly.
Despite the fact that over 70,000 viruses have been created,
relatively few have actually succeeded in spreading and
infecting users. During these early days, they were often easy
to remove and as they spread slowly, it was not necessary to
update antivirus software more than once a week.
22
Worms
Today hardly any traditional viruses are released at all. Those
who used to write viruses have now turned to worms instead.
A worm is a program, similar to a virus, that spreads through
networks either locally or over the Internet. Worms can
spread without any human intervention between servers on
the Internet, and propagate by transmitting exact copies of
their malicious code to other computers, which is then run
automatically. Worms can appear in the form of blended
threats (see below) and in their simplest form they are not
destructive, but cause damage by overloading affected systems.
Most worms to date have spread via email and have
required active user participation by double-clicking attached
files. However, many worms now spread automatically by
exploiting known security loopholes. They are increasingly
exploiting instant messaging services such as MSN Messenger,
Yahoo Messenger, ICQ, Internet Relay Chat (IRC) and file
sharing programs such as Kazaa.
The spread of worms does not only affect the infected
companies. Sometimes the flood of worms is so great that
connection to the Internet as a whole can become extremely
slow.
23
Trojan horses
Trojan horses, or Trojans, are actually a type of hacker tool.
In contrast to worms and viruses, Trojans cannot spread
themselves. Just like the Trojan horse of mythology, Trojans
are not what they seem. They can take the form of ordinary
computer programs that appear useful or interesting, but
conceal malicious code. Often this disguise is so appealing
that the recipient is duped into accepting the Trojan or
someone will download the program themselves from the
Internet. Once in place, the Trojan can invite intruders or
perform operations such as opening a backdoor to the
Internet so that an intruder can take control of the system.
Many Trojans steal passwords or install code that copies every
stroke on the keyboard to a hidden file. This information can
then be sent to a hacker.
Other Trojans are designed to attack other people’s
computers using so-called Denial of Service (DoS) attacks.
If the attack is successful, the targeted computers become
overloaded and cannot communicate with other computers.
More and more Trojans now spread by being automatically
downloaded to a user visiting a web page. The page contains
hidden instructions that download the Trojan and start it on
the user’s computer without them noticing. All the user sees
is that they are reading a web page. It is therefore very
important for all users to have up-to-date antivirus programs
and personal firewalls.
24
Blended threats
By themselves, worms, viruses and Trojan horses can be highly
damaging, but combined they can wreak even greater damage
to servers, workstations and websites. These so-called blended
threats use a combination of mechanisms to achieve wider,
faster distribution and cause more serious damage. Usually they
consist of a worm or Trojan horse that also exploits security
loopholes in operating systems or other programs.
One of the best-known blended threats was the Nimda worm,
which in September 1999 spread to over two million servers and
personal computers in a single day. Blended threats spread much
more easily and faster than ordinary worms, as they require no
active participation by the user. All it might take is for you to
visit an infected website or for your own computer to be set to
preview email messages.
Another example of a blended threat was Blaster, which
appeared in August 2003. Blaster did not make use of email, but
scanned the Internet for computers that had not been ‘patched’
against a known security loophole in the Windows operating
system, and used this to propagate.
To counter blended threats, protection must be introduced
at several levels. A threat that targets several weak points
simultaneously cannot be dealt with by a single security tool.
Just having an antivirus program is no longer sufficient; you
should combine antivirus, firewall and intrusion detection
technologies to put a stop to the spread of such threats.
25
Email threats and junk mail
Most security threats on the Internet are spread by email. If
‘infected’ messages slip past security measures and end up in
your inbox, it is still relatively easy to deal with the problem.
It is simply a case of detecting the infected message and
deleting it completely without opening it, and above all not
opening files attached to the message.
Antivirus programs deal with email threats effectively,
both on the user’s computer and on the mail server, provided
that they are correctly configured and updated. If your
company does not have its own mail server but relies on an
operator or service provider for email handling, it is wise to
choose a service that scans all traffic to filter out viruses and
junk mail. Even if your Internet service provider has its own
antivirus measures, users’ computers should also have
antivirus installed, as infections can be spread not only
Did you know that...?
directly over the Internet but also via instant messaging or
downloaded files and programs from the Internet.
During the first half of 2003,
the number of attacks rose
have shown that over 50 per cent of all email communications
by an average of 19 per cent
today consist of junk mail. Programs and services are now
to 38 attacks per company
compared to 32 attacks per
26
A growing problem today is spam, or junk mail. Studies
available specifically to tackle junk mail, for example Norton
AntiSpam. The program uses tools such as lists of approved
senders (white lists), lists of known junk mail distributors
company during the same
(black lists), and knowledge of the way of typical junk mail is
period in 2002.
structured in terms of vocabulary and headings.
EMAIL USAGE
Do not open attached files in messages from
unknown senders
If you do not recognise the name in the ‘From’
field, do not open the attachment.
Check with the sender
If you receive an unexpected message, or an
unexpected attachment from a known sender,
it may contain a virus or malicious code. Many
worms are spread via the address book in email
applications. Such messages are often given
away by a strange subject line or the name of
the attachment. Often it is a humorous message
encouraging the recipient to view a picture or
read an attached text file. Always request
confirmation from the sender before opening
such messages or attachments
Check the entire file name of attachments
Hidden file name extensions can dupe recipients
into opening infected email attachments. Always
ensure that the email application displays all file
extensions of attached files. Viruses and worms
may be contained in files that appear on screen
as images, typically with the file extension .jpg.
These have a hidden extension such as .exe or
.vbs appended to the file name, which means
that the attached file is not an image at all but
a program that is run when the attachment is
opened.
Beware of false virus warnings
False virus warnings are also known as ‘hoaxes’.
This is a type of chain letter that leads users to
believe that they have received a virus and encourages them to forward the warning to everyone they know. Symantec Security Response
(http://securityresponse.symantec.com) features
up-to-date information on real security threats
as well as false virus warnings.
Do not open junk mail
Junk mail (spam) disrupts work and fills inboxes,
but can also be a threat in another way. Email
containing junk adverts can also be used to carry
viruses and worms. For the sake of security, you
should delete all advertising messages with unknown senders immediately without opening
them.
Disable message previewing
Many email applications are able to show the
contents of a message in a separate window as
soon as it is received, without requiring you to
click on the message in the inbox list. Even if
most security threats spread by email use
attached files, there are examples of messages
that can infect as soon as they are opened,
even if they are opened automatically. It is wise
to disable message previewing for the inbox in
your email application.
27
Internal threats
AVOIDING MISUSE OF
INTERNET AND IT RESOURCES
Employees also constitute a risk, as do other people who have
access to a company’s premises or data network. It may be
that someone is out to harm the company or steal informa-
Restrict access to network
tion, but more often than not the problem is down to sheer
services that are not needed
ignorance or to someone who shouldn’t have access to infor-
by everyone. Disable services
mation managing to get hold of it. It is therefore important to
and functions that are seldom
establish a firm foundation for the security regime by training
or never required.
Set out clear rules on how
employees. The combination of a straightforward security
policy, well-trained employees and good routines ensure that
employees are allowed to use
everyone can follow the guidelines. This reduces the risk of
the Internet for private use,
unintentional damage as well as that caused deliberately.
and ensure that all employees
are informed about the rules
in force and any sanctions
that will apply.
Ensuring internal information security requires, by and
large, the same measures as the general security regime.
Sensitive information must never be accessible to all staff,
only to those who need it.
Use content filtering to block
access to undesirable
material on the Internet.
Follow the official guidelines
Phishing
Phishing, a fairly new but rapidly evolving phenomenon,
on how employees’ Internet
uses social engineering techniques to attempt to steal
use may be monitored.
personal information, including bank and credit card details,
via email. Recently, many Internet users have been subjected
to phishing attempts, when they received email messages that
were designed to look as though they came from legitimate
organisations such as banks. Fraudsters employ various
techniques that make it impossible for people to see that
the Web links they are encouraged to click on lead them to
illegitimate Internet sites. Once at these sites, they are
tricked into answering questions that are supposedly from
the company, but that actually result in the customers
disclosing confidential information on their accounts to
fraudsters.
28
Misuse of the company's IT resources
Computers and the Internet are work tools and should be
treated accordingly. How can misuse be stopped, and what
measures should be put in place to help? Before tackling these
issues, it is important to ask yourself the opposite question:
whether and in what way an employer has the right to
monitor employees in order to discover misuse. This is the
most sensitive of all policy issues.
There are technical solutions for restricting Internet
misuse, which if correctly applied may reduce the need to
monitor employees’ use of the Internet. Internet misuse can
be prevented using content filters, which block access to
undesirable or unauthorised content and websites. Content
filtering functions are available in many firewalls, but are
not usually enabled by default. The disadvantage of content
filtering is that some legitimate content and websites risk
being blocked, and it is unrealistic to expect it to work without
certain ‘side-effects’ and irritation among users
29
30
Security Rules
Designing security rules
So many users have themselves been directly or indirectly
affected by security issues that dealing with these problems
has become an everyday task for them. For this reason, many
users now have a broad awareness of security issues that they
Did you know that...?
would scarcely have if the threats had been less common than
they are today.
In the average company, 9.5
For IT managers and bosses, this means that they can
million log files and alerts
expect an understanding of the security regime, and a willing
are generated each month
and informed staff. Security can never be satisfactory if all the
by firewalls and intrusion
effort goes into building up technical solutions and routines
that only affect managers and IT personnel. It is equally
detection systems.
important to have a good policy as well as a strategy to deal
However, on average only
with information security issues.
two threats are so serious
A successful security regime depends on management
realising that a functioning IT infrastructure is critical to the
as to require direct intervention..
business. It is the responsibility of management to decide on
a security policy that is:
• feasible to implement and for employees to follow;
• concise and easily comprehensible;
• well-balanced between offering sufficient protection and
maintaining productivity.
As every company is unique, there are no two sets of rules
that are identical, but the process of designing a successful
security policy can often be structured in the same way.
31
Seven steps towards an effective security regime
1. Identify and evaluate information resources
What information exists within the company? Where is it
located? What value does it have? What would happen if it was
lost? Only when you know the value of your information can
you determine the scope of the resources you should employ in
protecting it.
2. Identify threat profiles
Where is the potential security problem? Evaluate the likelihood
of an incident occurring, and what consequences this would
have. Threats can be both external and internal
• External threats – e.g. viruses, worms, Trojan horses, hacker
attacks, aggrieved former employees, industrial espionage.
• Internal threats – e.g. dissatisfied employees with knowledge
of or access to vital data. Staff who use email and the Internet
in the wrong way may also constitute internal threats.
However, you should not forget that the majority of incidents
are mishaps caused by sheer ignorance.
3. Assess the risks
Calculate the likelihood of an incident occurring and the extent
of the potential damage. Data loss, integrity problems, liability,
undesirable attention, lost confidence among clients, owners
and partners, as well as the cost of repairing security loopholes,
must also be evaluated.
4. Share areas of responsibility
In smaller companies, it is natural for management not only to
bear the ultimate responsibility, but also to deal with practical
security issues themselves. On the other hand, it is not obvious
that the IT manager is also the right person to direct the overall
security regime. Instead it is a good rule to distinguish between
32
the technical and the administrative responsibility. In slightly
larger companies, it may be appropriate to appoint a
SECURITY POLICY
contingency planning group with overall responsibility for
identifying potential threats against the company. Key
members would include the network administrator, the finance
manager, a legal representative, a member of the board, a
human resources manager and an information/PR manager.
Scope. What will the security
policy cover? What is not
covered?
Responsibility. Who bears the
main responsibility internally?
5. Establish the security policy
Formulate a policy in coordination with the company’s other
guidelines and rules, as well as the contract of employment.
These documents should therefore comprise specific information on networks, IT platforms, user responsibility and
organisational structure. This avoids having to revise the
entire policy to reflect changes to the organisation. The
changes can instead be made in the relevant documents.
Aim. What is the aim of the
policy?
Security regime parameters.
What security level will/should
the company maintain?
Support, coordination and
control. Who will carry this out?
How will it be carried out?
Security levels and protective
measures.
6. Implement the policy
The policy must clearly define who is responsible for security
as well as who owns specific systems and information. The
Rules and guidelines. Which
rules apply to employees/
managers, and how will these
be communicated?
vital components in implementing the policy are:
Information and training.
• Compliance – establish a process to ensure that the policy is
Rights and obligations for both
adhered to and be clear on the action that may be taken if
someone breaches or ignores the policy.
• Responsibility – designate a person responsible for IT
security.
• Financing – ensure that the budget allows the security policy
to be followed.
users and system administrators.
Contingency planning. What
happens when the alarm sounds
and the contingency is realised?
Who is responsible for what?
What routines are in place to
mitigate the damage?
Annual review. Does the policy
7. Follow up and monitor the policy
All staff have a responsibility to comply with the policy and
need updating? What requirements have changed? How well
is the policy being observed?
consequently it must be read by everyone. The policy should
also be updated regularly to reflect changes to the organisation
or culture.
33
Contingency plan
It may be hard to imagine the worst possible scenario, precisely
because the assumption is that the risks of a real catastrophe are
very small indeed.
However, such a conclusion is often based on wishful thinking.
Assume for example that the company suffers a break-in and all
the computers are stolen – a scenario that is not at all improbable.
The aim must be to restore normal operations as quickly as
possible; in order to achieve this, good preparation is essential.
A contingency plan will therefore be closely linked to the
company’s information security policy.
Faults and computer crashes, both system- and networkrelated, affect all companies sooner or later. Fortunately most
of these disruptions are slight and short-lived, and are generally
resolved by normal servicing and support measures. But if
important data is lost or vital systems are down for longer
periods of time, business operations are affected more directly.
The break-in example demonstrates that even a small company
Did you know that...?
needs to prepare itself for an acute crisis situation. Larger
companies prepare for contingencies by putting backup solutions
The number of cases of
system standing by to take over at short notice if the worst
‘backdoors’ to IT systems
actually happens. Such solutions are however seldom available
increased by almost 50 per
for a small office, or would incur costs that could not be justified.
cent during the first half of
2003. The most remarkable
First and foremost, effective contingency protection requires
good backup routines. Therefore planning should not only
require regular backups to be made, but should also test data
attempt to steal confidenti-
restoration from backup copies. The process of restoring the
al data was Bugbear.B,
contents of the systems can also be simplified by so-called image
which specifically targeted
management. This entails measures such as saving copies of
banks and financial institutions.
34
for IT operations in place, which involve having a complete
malicious code that opens
the entire contents of hard disks. In a crisis situation you can
save a lot of time by restoring the system from this copy rather
than having to install all the software from scratch.
Companies can also outsource as much work as possible relating
to the operation of vital systems, leaving as little as possible in
terms of sensitive computers and data on their own premises.
CONT
INGE
NCY P
LAN
For example, a small company would do well not to have its
own web and email servers, but to purchase these in the form
of services from operators, web hotels or other consulting
firms. More and more of the most common IT systems can be
rented. The suppliers in this new service market are normally
called ASPs (Application Service Providers). They offer a broad
spectrum of services for such applications as financial control,
customer care, payroll and many more.
CONTINGENCY PLAN
• Set up a crisis group comprising representatives of the various departments of the company: finance, human resources, management, IT,
information/PR (the same working group as for
security policy; see page 33).
• Establish the aim of the plan. Is the aim to
protect certain information or other resources?
Is it to maintain certain business processes? An
understanding of the over-riding objective will
help the IT department to devise a strategic plan
determining the priority of the resources to be
protected.
• Carry out a complete inventory of the IT
tools, resources and tasks required to maintain
business operations and preserve the critical
functions as outlined in the strategic plan.
• Perform a risk analysis. Assess the financial,
technical, legal and operational harm that
could be caused by a security incident. The risk
analysis should include consequential damage
to customers and the company. You should
also analyse specific security threats and the
damage these can cause to the various departments.
• Draw up an action plan. Examine scenarios
involving various security threats and the
effects these would have. For each scenario,
determine who should be involved, responsibility, any costs incurred, etc.
• Plan B. Even the best contingency plans have
their shortcomings. Try to identify these and
develop alternative solutions.
• Communicate the plan. The plan will only be
effective if employees know and understand
both the plan and their role in it.
35
THE ACTION PLAN
The contingency plan will vary depending on
• Service providers and partners. Security
what type of security incident arises.
should be a vital component in every contract
For example, a virus attack might affect the
with suppliers and partners, especially if you
company’s operations in a different way to a
share information through an extranet or have
DoS attack. As there are many different security
a VPN connection between the companies.
threats, the plan should be flexible. All plans
IT should assess how a security breach in a
should nevertheless include the following:
partner’s/provider’s network would affect the
• Loss of data/information. This may be
caused by power cuts, viruses, hackers, etc.
company.
• IT resources. If a security incident occurs,
Prepare by backing up information on systems
IT may need to take on extra personnel. Be sure
and the network. Ensure that a policy is in
to identify in advance consultants that can be
place for the person responsible for performing
called in.
backups, including the type of media to be
used and how often they are to be carried out.
• Hardware backup. Companies that have their
own servers may require backup servers if
anything should happen to the primary server.
A backup power unit or UPS is an important
component of any contingency plan.
• Press. How will you deal with questions from
journalists? Who will comment on the matter?
Draw up a strategy.
• Budget. An incident may incur expenses over
and above what is included in the normal
budget. Clarify who determines whether a
situation is a contingency and can therefore
approve the use of the funds set aside.
36
Training staff
STAFF
TRAINING
Many security problems are the result of carelessness,
ignorance, or human error. The security policy, regardless of
how well formed and comprehensive it is, will only work in
practice if it is known to and complied with by the people it
affects.
It is a good idea to split training into a general module
Remember to say why, not
just how. By explaining a
problem and providing a
dealing with issues affecting everyone and another module
solution, it will be easier
that informs staff more specifically how they should use the
for the users to take in the
security utilities available. This requires particular contribu-
information.
tions on the part of those who will be taking administrative
Repeat the training several
responsibility, such as assignment of user rights, operation of
times. Explain important
firewalls, backup management, etc.
points and precisely why
Carrying out training internally in the form of a seminar
or classroom course underlines the importance of the security
they are important.
Draw up a checklist of the
issues, and will build up an awareness of security that is
most important points in the
based on, and also strengthens, staff loyalty.
security policy and display it
It is a good idea to spread the training over time. This
at strategic points (drinks
emphasises the fact that the company is operating an ongoing
vending machines, lifts,
security regime and that awareness among employees is as
etc.).
important next year as it is next week. Changes to systems
Make reference cards for all
and operations may also provide grounds for new training,
employees that they can
as well of course as new staff joining.
have to hand at their desks.
Ensure that the IT security
policy is accessible for
everyone.
37
38
Protection against Data Loss
UPSs and backup power
UPS stands for Uninterrupted Power Supply. As a minimum,
all systems with servers should have a UPS. It protects the
system and data from damage in the event of a power cut.
The unit contains batteries that cut in and supply the server
with power. A single UPS unit is designed to provide backup
power for at least 30 minutes, which is sufficient time to allow
the system to be shut down in a controlled manner. For longer
periods of backup power, a larger unit is required.
A UPS device should not be confused with a backup
generator that can run computers continuously during a
power cut. This requires a ‘mini-power station’ that is usually
driven by diesel generators, a very costly solution that is
normally only accessible to large computer centres. The cost
of a UPS unit is within the reach of most companies, with
prices ranging from a few hundred pounds.
Backup routines
Technology is seldom of particular importance for a good
backup solution. Performance only becomes a factor that
needs to be taken into account if you have very high demands
for accessibility or unusually large volumes of data in relation
to the size of the company. The most important thing is to
design good backup routines. You can either perform a full
backup copy (of programs and data) or only back up data files.
The advantage of performing a full backup is that you can get
back on your feet quickly after an incident, and that you
39
maintain any settings you may have changed in programmes
since they were installed.
Managing daily tape changes is a simple task, as is checking
the backup log to see whether the process is working normally.
Responsibility for the backup routines should therefore lie with
the IT manager or a specialist. However, you should remember
to regularly test whether you can restore content from the
backup copy.
Backups
Backups are a fundamental tool in ensuring information security.
Backups are simple to set up and do not incur any prohibitive
costs. A network server always has space for a backup device
BACKUPS
Designate someone responsible for performing
backups.
All vital changeable data should be backed up
daily.
Make backups both on servers and on users’
hard disks.
Regularly test whether information can be
restored from the backup copy.
40
Ensure that you have an ‘image’ copy
(a complete copy of the content) of all hard
disks available. This vastly simplifies the task
of restoring the content and getting started
again following a computer crash or theft.
An ‘image’ copy also saves all settings you
have made to the operating system since
installation.
to which data can be copied, partially from the server hard
disk and partially from users’ computers via the local area
network. Backup devices usually consist of a tape station with
cassettes. Currently the most common types of tape are DLT
(Digital Linear Tape) and DAT (Digital Audio Tape). DLT is the
optimal technology. For greater capacity, robotic tape libraries
are available with space for several cassettes that are changed
automatically.
At the lower end of the backup scale are ordinary
CD-ROMs. Even relatively simple personal computers are
equipped nowadays with built-in burners for CD-ROMs or
DVDs, which are excellent for backing up personal data, and
sometimes also for smaller businesses. However, you should
bear in mind that home-burned CD-ROMs are quite sensitive.
Unlike recorded discs you buy in the shops they have no
protective coating on the recording surface. Ordinary tap
water may be enough to damage the surface.
41
42
Protection against Intrusion
and Malicious Software
Firewall
All connections to the Internet need to be protected by a firewall. A firewall should be used where you have an internal
company network that is connected to the Internet or to
another external network out of your control. However, you
do not normally need a firewall with a company network that
only consists of fixed connections between different devices,
even if such a network uses the same communication
technology as the Internet. It is always essential to configure
the firewall correctly.
A firewall enables you to control and regulate what data
Did you know that...?
In April 2002, the Klez
worm was discovered. It
spread itself via an attached file in an email mes-
traffic is permitted to be exchanged between two networks,
sage to addresses in the
or between an individual user and an external network. In a
Windows address book,
company it is normal to place the firewall between the office’s
local area network and its Internet connection. The main task
of the firewall is to protect the company from external threats
the ICQ database and local
files. The email message
such as intrusion by hackers, but it can also be used to
arrived with a randomly
restrict the way in which staff and their computers are able
generated subject line.
to communicate with the outside world.
You should also bear in mind that mobile users, home
workers and staff connecting to the Internet from a hotel etc.
need a software firewall on their computer, as the company
network firewall cannot protect them outside the network.
The term ‘port’ is closely associated with firewalls. Here it
is important to differentiate between physical ports, such as
connections for network cables or printer cables, and virtual
ports. A virtual port may be compared to a channel in the
network reserved for a certain type of traffic. Each computer
43
has 65,536 virtual ports. You could compare a computer to a
telephone exchange in which each type of traffic has its own
connection. For example, port 80 is used for Internet traffic,
ports 25 and 110 are used for email, port 21 is used for file
transfer, and so on.
The role of the firewall is to close all ports that are not
needed. It monitors the ports and determines which ones
should be open. Various rules allow the traffic to be filtered
and prevent unauthorised incoming traffic. The firewall
notices if an outsider attempts to connect to an open port or
tries to open a port that is already closed, and warns the
security manager of activity that appears abnormal.
Did you know that...?
The W32.Blaster worm only
infects computers running
Hardware-based and software-based firewalls
Firewalls can be either hardware-based or software-based.
Windows 2000 and XP. The
The most common are software-based ones that are installed
Welchia worm is unique in
and run on an ordinary computer dedicated to this purpose.
that it appears just to attempt
No other programs should be run on this computer, as this
to protect systems against
Blaster by downloading a
dramatically increases the risk of intrusion.
A hardware-based firewall is a standalone device that
works more or less straight out of the box. Home users with
patch from Microsoft.
broadband connections for example can obtain a combination
However, it also opens a
firewall and cable modem/ADSL router. There are also fire-
backdoor on the infected
walls currently available with a range of extended functions
computer, and results in
denial-of-service attacks for
many companies. There is no
such thing as a good worm!
integrated into a single device; intrusion detection, content
filtering, virtual private networking and virus protection.
One example of this type of integrated firewall is Symantec
Gateway Security.
On individual computers, personal firewalls should be used
(in company environments these are also called distributed
firewalls). Personal firewalls run on ordinary user computers
44
that can also run other applications in parallel. These work in
a different way and must not be confused with the common
firewall that protects the entire local area network. An
example is Norton Personal Firewall, which is also available
as part of Symantec’s Norton Internet Security software.
A personal firewall is required when connecting the computer
to the Internet outside the office network, as it is no longer
protected by the company network firewall.
Firewall principles
The simplest form of firewall uses packet filtering. Data sent
over a network is divided up into lots of tiny pieces known as
packets. Each packet begins with information known as the
packet header that the network needs in order to transport it.
A firewall that uses filtering at the packet level only checks
the information in the data packet header in order to control
access to the network. Unfortunately, this is not such a secure
method, but has been used for many years as it permits high
transmission speeds.
Another important function of firewalls is Network
Address Translation (NAT). To allow users sitting behind the
firewall on the office local area network to communicate with
the Internet, they are allocated an external (public) Internet
address. Behind the firewall they use totally different network
addresses between themselves. Translation ensures that the
entire local area network is ‘hidden’ behind a single address
allocated by the firewall. All the users on the local area
network then appear to other systems on the Internet as if
they are all on the same computer. However, NAT is only
one component of a complete firewall and on its own does not
provide a satisfactory level of security.
45
The current trend is to have more advanced firewalls that
monitor applications, known as ‘proxy firewalls’. In this
context, the word proxy is used to mean ‘substitute’. A proxy
is a computer or program that assumes tasks from another
computer. A proxy firewall takes over communication with the
Internet for all computers that are connected to it, so that
users cannot communicate directly with the Internet, but only
through a proxy.
Whichever firewall you use, it is essential that you check
the logs that it generates. As this requires a great deal of
knowledge, it is common to delegate this to specialists. One
good option is to have the firewall monitored continuously by
a third party with expertise in this area in precisely the same
way as an alarm company monitors the burglar alarm.
Antivirus
Obtaining an antivirus program is often the very first security
measure taken by home users and companies alike. Virus
protection should cover the Internet connection, all servers
and all workstations.
An important characteristic of an antivirus program is that
it must be able to adapt to a threat profile that is constantly
changing. Every day new threats such as worms, Trojan
horses and viruses appear on the Internet. Even though
modern antivirus protection is often able to detect new threats
directly, the risk of infection is reduced if the antivirus
program is able to compare a suspected threat against
definitions, which is a sort of digital fingerprint designed by
the providers for every new threat that is discovered. New
definitions and other information that assists in stopping new
threats can be automatically downloaded to the antivirus program via the Internet in order to update the user’s protection.
46
More than 100 new threats are discovered every week. The best
level of protection therefore requires the virus definitions to be
updated very regularly, at least once a day. In addition, it is
advisable to schedule complete system scans for at least once
a week.
Intrusion detection
An intrusion detection system (IDS) monitors and analyses
network traffic in order to discover whether an intruder has
broken in to the system or whether it is being misused by users
within the organisation itself. The intrusion detection system
takes over where the firewall stops and monitors traffic in a
broader context. This would be the case, for example, if a large
number of connection attempts are made against different
virtual ports on a computer. This is a sign of port scanning,
a classic way of mapping an unknown system. If this were to
happen, the intrusion detection system would discover what
is happening in good time and warn the person responsible.
An intrusion detection system can either be run as a program
on the machine to be protected (host-based IDS) or on a standalone device that monitors all network traffic (network-based
IDS). There is nothing to stop you using both variants in parallel,
but the most common option is to use network-based IDS.
The most common type of intrusion detection is based on
the system being able to recognise and anticipate attacks. The
other common basic principle is statistical intrusion detection
that differentiates between normal and abnormal traffic and
generates an alert when traffic deviates from a certain pattern.
Did you know that...?
Sobig is a mass-mailing
network worm that sends
itself to all email addresses
it finds in certain files. Sobig
also releases confidential
information, and in some
cases steals system information such as passwords.
Just as with firewalls, intrusion detection systems must be
Sobig is unique as it shuts
monitored and their logs analysed, otherwise the systems serve
itself down after a certain
no purpose. In order to be able to detect real and dangerous
amount of time.
intrusions, you will also have to analyse large amounts of false
47
messages. Just as with firewalls, for this reason it may be wise
to delegate this task to a specialist who can also take care of the
intrusion detection system around the clock. The optimum level
of security can be obtained by monitoring both firewalls and
IDSs, and comparing the information from both these security
systems.
One problem with intrusion detection systems is that they
can be triggered by all network events if they are not configured
correctly. Therefore time is well spent carefully configuring the
intrusion detection system to prevent false alarms.
User IDs and access control
In exactly the same way that you need to keep check of who has
permission to enter the company’s premises, you will naturally
also want to control who has access to your data systems and
deny entry to unauthorised users.
All computer systems in normal offices have integrated
functions to control access to programs and data. Users are
allocated identities and passwords that have to be entered in
order to access server contents, network services or to be able
to run a specific program. Common operating systems such as
Windows and Unix provide you with a comprehensive set of
options to control individual users’ access rights. It is part of
the IT administrator’s job to allocate these rights.
Even this aspect of the job involves many things that can be
done to raise the level of security, beginning with not assuming
that all users should have the same rights, but allocating rights
according to the demands of their work. You have to be aware
both of the existence of such options and that a certain amount
of effort is required to benefit from them.
Most companies and public authorities make do with the
access control options that are offered as standard on their
48
chosen IT platform. But particularly in larger companies and
offices in which computers are accessible by the public, these
options are reinforced by separate user identification systems.
Such solutions often utilise smartcards that frequently double
as personal ID and pass cards for staff. Every workstation is
then equipped with a card reader that only allows the computer
to be used if an ID card is inserted in the reader and the user
has entered the code associated with the card. The system also
comprises a central program in which every user’s identities,
passwords and rights for various systems are stored.
For users, a separate system for access control is a practical
solution as it avoids them having to maintain lots of different
user identities and passwords – all the services a user has
rights to can be connected automatically.
Encryption
Perhaps the most important reason to use encryption is
because it provides ‘theft protection’ for information. Lost and
stolen computers are rarely recovered, but valuable information
is not lost if it has been backed up and the thief cannot access
it. Encryption is a classic method of protecting sensitive data,
preventing everyone except authorised users from accessing
it in plain text. The advent of computers has made encryption
easier, but at the same time it has become far simpler, to crack
the encryption.
Most computer systems and networks therefore use
encryption sparingly. Passwords are usually stored in encrypted
form as standard, but not much else. The main reason is
financial, partly because the encryption technology itself
costs money, and partly because it requires a good deal of
administration. If there is a problem with the encryption
software, this could mean loss of data and working time.
49
Making more extensive use of encryption has long been
impractical for most companies, and it has generally only
been used by the military, banks and financial institutions and
within other organisations with a similar requirement for
secrecy. However, encryption is a quite realistic option. For
example, programs are available that can continually encrypt
the contents of a hard disk on a personal computer at relatively
low cost. Encryption of email is also a common measure that
can be implemented with easily accessible and relatively userfriendly tools.
Antivirus software and encryption software may have
certain compatibility issues as they often have to access the
same computer resources. In principle, if the encryption
software becomes infected by a virus, it may be impossible to
clean the program
Digital signatures
These are a special form of encryption, which are used in
e-commerce and business transactions on the Internet.
A digital signature performs the same function as an ordinary
written signature. A digital signature in an email message
guarantees that it has been written and sent by the person
Did you know that...?
stated as the sender, and that the message has not been tampered with or damaged during transmission. Using Public Key
Every week over 100 new viru-
Infrastructure (PKI) with one private encryption key and a
ses and some seventy new sof-
one public one, digital signatures can also be used to encrypt
tware security loopholes are dis-
and sign emails sent between users that have never been in
covered.
prior contact with each other.
50
Passwords
PASSWORDS
Most computer users require several passwords – one for
email, one for the accounting system, one to log in to their
computer, and so on. Many people have a dozen or so pass-
A strong password:
words, and keeping track of all their user names and pass-
consists of a combination of
words can be a problem. The challenge in creating a strong,
lower-case and upper-case
hacker-proof password is to make the password as difficult as
characters plus digits and
possible to guess without making it impossible to remember.
symbols (an S can be
swapped for the symbol $,
Avoid vulnerable passwords
Once you have created a strong password, make sure that you
and O for a zero, etc.);
is at least eight characters
keep it as safe as possible. Never email a password to anyone
long (the more characters a
and never disclose it to anyone who asks, even if that person
password contains, the more
works for the company. The IT manager should already have
difficult is it to steal or crack
access to your systems. Never use a password that you use
using a hacker tool);
within the company’s systems when you enter a password on
the Internet. Changing back to an old password only increases
is easy to remember and
must never be written down;
the risk to which you are exposing yourself.
should be changed regularly;
• Never use names or numbers that can be associated with
is only used for one service
you, such as birthdays, nicknames, telephone numbers or
or system. Create different
addresses.
passwords for each account
• Never use your user name as a password, in any form.
or user identity.
• Do not use your own name or that of a family member or
pet.
• Never use the word ‘password’.
51
Tips for remembering passwords
Passwords should always be memorised, never written down.
• Form an acronym by thinking of the chorus from a song and
taking the first letter of each word.
• Choose two short words that have nothing to do with each
other and combine them using symbols or digits, e.g.
‘moss9table’ or ‘quick!carpet’.
• Use a common phrase but replace ‘o’s with zeros, ‘i’s with
ones, etc.
• Use upper-case and lower-case letters in combination with
digits and symbols.
Utilities for storing passwords
If it becomes difficult to keep all your passwords in your head,
utilities do exist for managing them in a secure way:
• Software.
A utility allows you to store all your user identities and
passwords, all of which can then be accessed by entering a
single password that you have to memorise. One example
of such a tool is Norton Password Manager from Symantec.
• Hardware-based access control systems
In larger companies and public authorities, it is common to
have access control systems that use smart cards to identify
users.
• Web services for storing passwords
There are many services available on the Internet that allow
you to access your saved user names and passwords. Many
also offer 128-bit encryption. The limitation is that the
services can only be used to log into websites and systems
with a web browser interface.
52
SECURITY ADVICE FOR OFFICE COMPUTER USERS
Use strong passwords. Never disclose
Do not disclose personal information on
your password, and ensure they are strong.
unsecure Internet pages. Be wary of dis-
A strong password consists of at least 8
closing personal and sensitive information.
characters and contains a mixture of letters,
Only disclose sensitive information on secure
digits and symbols. Do not use easy-to-guess
web pages (indicated by a padlock or key in
words.
the web browser window).
Use virus protection, and never disable the
virus protection installed on your computer.
Never leave your computer logged on when
it is not in use. Shut your computer down at
the end of your working day.
Do not open unexpected or suspicious email.
In particular, do not open files attached to
suspicious messages.
Never forward virus warnings and chain
letters you receive by email. Virus warnings
are often false and can be recognised by the
fact that they encourage the recipient to
forward the message to everyone they know.
Ensure you make backups of your important
files. Inform the system manager if you
notice anything usual with the automatic
process.
Take care of your laptop computer. Do not
leave it unattended in public, visible in your
car or in any other place that makes it easily
accessible to thieves.
Remember to update the software on your
computer. If the provider discovers a
security bug in the software, they produce
a ‘patch’ that fixes the bug when installed.
Many software applications today have an
automatic search feature for new updates;
Enable the security settings in your web
ensure that it is enabled.
browser. Do not permanently disable security
controls just because individual websites
require you to in order for them to work.
53
Virtual private networking (VPN)
Did you know that...?
In January 2004, Brightmail
A Virtual Private Network (VPN) refers to the use of a public
network such as the Internet for constructing a private network
for a company. The fact that VPN technology is based on encryp-
calculated that 60 per cent
tion makes it very secure and means that private traffic is effec-
of all email was junk mail, or
tively separated from other parties sharing the same
spam. The most frequent
infrastructure. From the very beginning, VPN has mainly been
type was product offers,
a solution for larger companies with large traffic volumes and
closely followed by financial
offers and pornography.
their own personnel to administer it. However, many operators
now offer VPN services that are also aimed at smaller companies.
A company with two offices in different locations can, for
example, use a VPN solution to link the local area networks of
the respective offices instead of leasing fixed lines between the
offices. Traffic then passes over the Internet through a secure
‘tunnel’. By delegating monitoring to the operator, it can also
be a practical solution from an administrative point of view.
A virtual private network also functions as a secure solution for
staff who need to connect to the office local area network while
working from home or on a business trip.
54
55
VULNERABILITY ANALYSIS
It is important to begin by determining the
perform the analysis is available internally or
will be used for. Do you want to find out
whether external help is required.
whether there are vulnerabilities in the
systems, or whether you can gain access to
critical systems, or do you want a full security
report?
Next you need to select a method. To check
whether there are vulnerable systems in the
network, it may be sufficient to perform a
vulnerability analysis using a software utility.
If you want to know whether it is possible to
gain access to the company’s critical servers,
you could hire a consultant to perform a
penetration test. If you want a total review of
security to certify the company according to a
security standard such as ISO 17799, you
should get the help of a consultant who will
help you establish guidelines and plans for
the certification.
56
Determine whether the knowledge required to
scope of the analysis, and what the results
Establish a plan for how the analysis will be
carried out, who is responsible for it and who
will supervise the follow-up work.
After performing the analysis, ensure that you
study the results carefully and take steps to
improve any weak areas identified.
Vulnerability analysis
A company should not be content with installing a range of
VULNERABILITY TEST
USING SOFTWARE
security products, but should also obtain clear confirmation
that they have good protection in place. This can best be done
through a vulnerability analysis.
In a full vulnerability analysis, all imaginable settings are
checked relating to access to systems, data and resources, as
well as configurations that might lead to problems. Many
A tool used for vulnerability
analysis should do the
following:
Test the entire network for
companies perform vulnerability analyses using a scanning
security loopholes and advise
tool that can look ‘in depth’ into a network and expose
on how they can be blocked.
weak points. The scanning tool can test factors such as the
Examine multiple operating
network’s sensitivity to known vulnerabilities in operating
systems, including Unix,
systems, applications and passwords. It can also use advanced
Linux, Windows and NetWare.
tracking methods that attempt to recreate the steps that an
intruder would have to take in order to discover and exploit a
network vulnerability.
You can also choose to perform a ‘penetration test’, which
Keep itself up-to-date with
the latest security warnings.
Present the search result
graphically and detect the
involves selecting parts of the network and simulating an
sources and causes of
attempted intrusion to check whether it is possible to gain
vulnerabilities.
access to the systems.
Produce reports that can be
adapted for various target
groups.
57
58
Security Products for Small
and Medium-Sized Companies
These icons are used in the following section to show the
products required for optimum security.
Remote
File Server
Desktops or notebooks
outside the office
The company's
information storehouse
where important files
and programs are kept
File Server
Remote
Desktop
Internet
Access to a multitude
of virtual worlds
Individual computers,
which can be linked via
a network
Gateway
Internet
Desktop
Mail Server
Gateway
Your single channel on to
the world wide web
Mail Server
Your communication hub
with lots of information
coming in and going out
59
Antivirus
What? Software that identifies and eliminates damaging sofRemote
tware or macros.
File Server
Where? Workstations (laptops and desktops), server, gateway.
When? If the computer is in contact with external factors, i.e.
if it communicates via the Internet, has a
Internet
Gateway
CD-ROM that is in use, sends or receives email,
Desktop
Mail Server
or has a floppy drive.
Why?
To protect the computer against malicious code,
worms and Trojans.
Firewall
What? Available in both hardware and software form.
Remote
File Server
Protects the local area network from intrusion via the
Internet by filtering data traffic and restricting the
accessibility of network services to computers behind
Internet
the firewall.
Gateway
Desktop
Where? Workstations (laptops and desktops), gateway.
Mail Server
When? For all types of network, both internally and externally.
Why?
To protect against intrusion and unauthorised access
to information.
Personal firewall / distributed firewall
Remote
File Server
What? Software firewall installed on the user’s computer.
Where? Workstations (laptops and desktops).
When? When the computer communicates via the Internet
Internet
and is not protected by the network firewall.
Gateway
Desktop
Mail Server
Why?
To protect you from intrusion and give control over
which programs and services can communicate on your
machine.
60
Intrusion detection
What? Available in both hardware and software form.
An extra layer of security that examines the content
Remote
File Server
and behaviour of Internet traffic in order to search
for malicious code or attacks.
Where? Workstations (laptops and desktops), server, gateway.
When? When you want a better overview of your network
Internet
Desktop
Mail Server
and be able to see what is happening.
Why?
Gateway
If you want to protect a special server/service that
requires greater security.
VPN
What? Software installed on the user’s computer and used
to create a secure ‘tunnel’ for traffic between a
Remote
File Server
remote worker and the local area network. Often
included with hardware and software firewalls.
Where? Workstations (laptops and desktops), gateway.
When? When you want to access the company network
Internet
Gateway
Desktop
Mail Server
from the outside.
Why?
To prevent unauthorised parties from viewing the
information passing between your computer and
the network.
Encryption
What? An effective way to protect data from unauthorised
Remote
File Server
access by means of controlled scrambling, using an
encryption algorithm.
Where? Workstations (laptops and desktops).
When? Whenever you send sensitive information by email.
Why?
To protect sensitive information from theft or being
Internet
Gateway
Desktop
Mail Server
read by someone who should not read it.
61
SSO, Single Sign-On
What? Removes the need for a user to use several passwords
Remote
when switching between applications. The user can
File Server
enter a single name and password to gain access to
multiple applications or to a number of resources
within a company.
Internet
Gateway
Desktop
Mail Server
Where? Workstations (laptops and desktops), server, gateway.
When? When you want to simplify password administration.
Why?
To reduce the number of passwords needed.
Content filtering (Internet and email)
What? Filters traffic over the Internet / via email.
Remote
File Server
Where? Workstations (laptops and desktops), server, gateway.
When? Content filtering can be used to regulate the use of
the Internet internally, or to prevent sensitive infor-
Internet
mation leaving the company.
Gateway
Desktop
Why?
To regulate non-job-related Internet traffic in order to
Mail Server
increase bandwidth capacity and prevent sensitive
information leaving the company.
62
63
INTEGRATED SECURITY
VIRUS PROTECTION
Symantec™
Client Security
Business Pack*
Symantec™ Client Security Norton Internet Security™
Small Office Pack
with Groupware Protection
Business Pack
Norton™
Personal Firewall
Small Office Pack
Norton
AntiSpam™
Small Office Pack
Firewall – intrusion protection
against hackers
Norton AntiVirus™
Small Office Pack
Symantec AntiVirus™
Business Pack*
Symantec AntiVirus™
with Groupware Protection
Business Pack
Symantec AntiVirus™
Multi-Tier Protection
Business Pack*
Removes viruses automatically
without interrupting your work
Scans and cleans email
Privacy protection
– blocks confidential information
from being sent
Blocks new script-based viruses and prevents
worms from spreading
Protects against new viruses
with automatic updates
Stealth mode – makes PCs
invisible to other Internet users
Ad blocking
Scans and cleans
instant messages
Filters spam and unwanted
email content
Virus protection for desktops
Virus protection for servers
Content filtering
Virus protection for Microsoft Exchange®
and Lotus Domino® email servers
Controls workgroup Internet access on a
small network
Virus protection for SMTP gateways
Virus protection for desktops
* Also available via the Value License Program
Virus protection for servers
Virus protection for Microsoft Exchange®
and Lotus Domino® email servers
Updates automatically
to protect against new threats
* Also available via the Value License Program.
SECURITY APPLIANCES
PROBLEM SOLVING
SymantecTM Gateway Security 320
Firewall
Virtual Private Networking (VPN)
SymantecTM Gateway Security 360 and 360R
Stateful firewall that inspects at the IP and circuit layers
Gateway-to-gateway,
client-to-gateway and VPN-passthrough
Gateway-to-gateway, client-to-gateway and
VPN-passthrough 360R - includes 10 client-to-gateway licenses
Norton™ SystemWorks Premier
Small Office Pack
Supports encryption using DES, 3DES and AES.
IPsec
Intrusion prevention
Gating - blocks a specific detected event from passing through the firewall
Intrusion detection
Signature-based intrusion detection
Antivirus protection
Antivirus policy enforcement - appliance constantly queries network entities and remote users
to ensure antivirus is running and blocks or warns if not
Content filtering
Removes viruses automatically
without interrupting your work
Two user-definable URL lists (allow and deny), maximum of 100 entries each
Restores your PC to its
previous working state
Antispam
Standalone web-based management
High Availability
Scans and cleans email
Blocks new script-based viruses and
prevents worms from spreading
Yes
Yes
via external modem
via external modem or second WAN port
Monitors your PC continuously to
identify problems before they occur
Wireless access point security
Maximum recommended users / nodes
Maximum firewall throughput
VPN (DES, 3DES, AES) and WEP
VPN (DES, 3DES, AES) and WEP
50
100
55 Mbps
60 Mbps
Removes old software applications
and other unneeded files
broad range of software, appliances and services designed to help
individuals, small and mid-sized businesses, and large enterprises
secure and manage their IT infrastructure. Symantec's Norton
brand of products is the worldwide leader in consumer security
and problem-solving solutions.
Headquartered in Cupertino, Calif., Symantec has operations
in more than 35 countries. More information is available at
www.symantec.com.
IT Security for Small Businesses
Creates backup disks, restores files quickly
and clones one hard drive to another
Stores confidential passwords
and credit card numbers
Symantec is the global leader in information security providing a
▼
Optimises file storage
Load Balancing and throughput aggregation via dual WAN ports
Load Balancing
Prevent unwanted
access by intruders
About Symantec
IT Security for Small Businesses
Intrusion detection
Unfold this section to find out about Symantec's IT security products that can help to protect your business
Compare Symantec's IT security solutions to find which one
best suits your business.
Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation.
Copyright © 2004 Symantec Corporation. All rights reserved.
All product information is subject to change. 09/04
INTEGRATED SECURITY
VIRUS PROTECTION
Symantec™
Client Security
Business Pack*
Symantec™ Client Security Norton Internet Security™
Small Office Pack
with Groupware Protection
Business Pack
Norton™
Personal Firewall
Small Office Pack
Norton
AntiSpam™
Small Office Pack
Firewall – intrusion protection
against hackers
Norton AntiVirus™
Small Office Pack
Symantec AntiVirus™
Business Pack*
Symantec AntiVirus™
with Groupware Protection
Business Pack
Symantec AntiVirus™
Multi-Tier Protection
Business Pack*
Removes viruses automatically
without interrupting your work
Scans and cleans email
Privacy protection
– blocks confidential information
from being sent
Blocks new script-based viruses and prevents
worms from spreading
Protects against new viruses
with automatic updates
Stealth mode – makes PCs
invisible to other Internet users
Ad blocking
Scans and cleans
instant messages
Filters spam and unwanted
email content
Virus protection for desktops
Virus protection for servers
Content filtering
Virus protection for Microsoft Exchange®
and Lotus Domino® email servers
Controls workgroup Internet access on a
small network
Virus protection for SMTP gateways
Virus protection for desktops
* Also available via the Value License Program
Virus protection for servers
Virus protection for Microsoft Exchange®
and Lotus Domino® email servers
Updates automatically
to protect against new threats
* Also available via the Value License Program.
SECURITY APPLIANCES
PROBLEM SOLVING
SymantecTM Gateway Security 320
Firewall
Virtual Private Networking (VPN)
SymantecTM Gateway Security 360 and 360R
Stateful firewall that inspects at the IP and circuit layers
Gateway-to-gateway,
client-to-gateway and VPN-passthrough
Gateway-to-gateway, client-to-gateway and
VPN-passthrough 360R - includes 10 client-to-gateway licenses
Norton™ SystemWorks Premier
Small Office Pack
Supports encryption using DES, 3DES and AES.
IPsec
Intrusion prevention
Gating - blocks a specific detected event from passing through the firewall
Intrusion detection
Signature-based intrusion detection
Antivirus protection
Antivirus policy enforcement - appliance constantly queries network entities and remote users
to ensure antivirus is running and blocks or warns if not
Content filtering
Removes viruses automatically
without interrupting your work
Two user-definable URL lists (allow and deny), maximum of 100 entries each
Restores your PC to its
previous working state
Antispam
Standalone web-based management
High Availability
Scans and cleans email
Blocks new script-based viruses and
prevents worms from spreading
Yes
Yes
via external modem
via external modem or second WAN port
Monitors your PC continuously to
identify problems before they occur
Wireless access point security
Maximum recommended users / nodes
Maximum firewall throughput
VPN (DES, 3DES, AES) and WEP
VPN (DES, 3DES, AES) and WEP
50
100
55 Mbps
60 Mbps
Removes old software applications
and other unneeded files
broad range of software, appliances and services designed to help
individuals, small and mid-sized businesses, and large enterprises
secure and manage their IT infrastructure. Symantec's Norton
brand of products is the worldwide leader in consumer security
and problem-solving solutions.
Headquartered in Cupertino, Calif., Symantec has operations
in more than 35 countries. More information is available at
www.symantec.com.
IT Security for Small Businesses
Creates backup disks, restores files quickly
and clones one hard drive to another
Stores confidential passwords
and credit card numbers
Symantec is the global leader in information security providing a
▼
Optimises file storage
Load Balancing and throughput aggregation via dual WAN ports
Load Balancing
Prevent unwanted
access by intruders
About Symantec
IT Security for Small Businesses
Intrusion detection
Unfold this section to find out about Symantec's IT security products that can help to protect your business
Compare Symantec's IT security solutions to find which one
best suits your business.
Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation.
Copyright © 2004 Symantec Corporation. All rights reserved.
All product information is subject to change. 09/04
INTEGRATED SECURITY
VIRUS PROTECTION
Symantec™
Client Security
Business Pack*
Symantec™ Client Security Norton Internet Security™
Small Office Pack
with Groupware Protection
Business Pack
Norton™
Personal Firewall
Small Office Pack
Norton
AntiSpam™
Small Office Pack
Firewall – intrusion protection
against hackers
Norton AntiVirus™
Small Office Pack
Symantec AntiVirus™
Business Pack*
Symantec AntiVirus™
with Groupware Protection
Business Pack
Symantec AntiVirus™
Multi-Tier Protection
Business Pack*
Removes viruses automatically
without interrupting your work
Scans and cleans email
Privacy protection
– blocks confidential information
from being sent
Blocks new script-based viruses and prevents
worms from spreading
Protects against new viruses
with automatic updates
Stealth mode – makes PCs
invisible to other Internet users
Ad blocking
Scans and cleans
instant messages
Filters spam and unwanted
email content
Virus protection for desktops
Virus protection for servers
Content filtering
Virus protection for Microsoft Exchange®
and Lotus Domino® email servers
Controls workgroup Internet access on a
small network
Virus protection for SMTP gateways
Virus protection for desktops
* Also available via the Value License Program
Virus protection for servers
Virus protection for Microsoft Exchange®
and Lotus Domino® email servers
Updates automatically
to protect against new threats
* Also available via the Value License Program.
SECURITY APPLIANCES
PROBLEM SOLVING
SymantecTM Gateway Security 320
Firewall
Virtual Private Networking (VPN)
SymantecTM Gateway Security 360 and 360R
Stateful firewall that inspects at the IP and circuit layers
Gateway-to-gateway,
client-to-gateway and VPN-passthrough
Gateway-to-gateway, client-to-gateway and
VPN-passthrough 360R - includes 10 client-to-gateway licenses
Norton™ SystemWorks Premier
Small Office Pack
Supports encryption using DES, 3DES and AES.
IPsec
Intrusion prevention
Gating - blocks a specific detected event from passing through the firewall
Intrusion detection
Signature-based intrusion detection
Antivirus protection
Antivirus policy enforcement - appliance constantly queries network entities and remote users
to ensure antivirus is running and blocks or warns if not
Content filtering
Removes viruses automatically
without interrupting your work
Two user-definable URL lists (allow and deny), maximum of 100 entries each
Restores your PC to its
previous working state
Antispam
Standalone web-based management
High Availability
Scans and cleans email
Blocks new script-based viruses and
prevents worms from spreading
Yes
Yes
via external modem
via external modem or second WAN port
Monitors your PC continuously to
identify problems before they occur
Wireless access point security
Maximum recommended users / nodes
Maximum firewall throughput
VPN (DES, 3DES, AES) and WEP
VPN (DES, 3DES, AES) and WEP
50
100
55 Mbps
60 Mbps
Removes old software applications
and other unneeded files
broad range of software, appliances and services designed to help
individuals, small and mid-sized businesses, and large enterprises
secure and manage their IT infrastructure. Symantec's Norton
brand of products is the worldwide leader in consumer security
and problem-solving solutions.
Headquartered in Cupertino, Calif., Symantec has operations
in more than 35 countries. More information is available at
www.symantec.com.
IT Security for Small Businesses
Creates backup disks, restores files quickly
and clones one hard drive to another
Stores confidential passwords
and credit card numbers
Symantec is the global leader in information security providing a
▼
Optimises file storage
Load Balancing and throughput aggregation via dual WAN ports
Load Balancing
Prevent unwanted
access by intruders
About Symantec
IT Security for Small Businesses
Intrusion detection
Unfold this section to find out about Symantec's IT security products that can help to protect your business
Compare Symantec's IT security solutions to find which one
best suits your business.
Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation.
Copyright © 2004 Symantec Corporation. All rights reserved.
All product information is subject to change. 09/04