![]() Keeping clients' computers safe and profitable for over 30 years | |||
Home Forms About Current Newsletter subscribe Search All Articles
Browse by Category
![]() |
Layered SecurityOne crucial concept for exploring the Internet safely is "Layered Security". The idea is that you have many layers of security. It is only the simultaneous failure of many systems that results in a severe problem. When driving safely, you will exercise care in your driving; you will not only be careful, but you will not drive while intoxicated, or when too tired to pay attention. You will have an attitude of vigilance while driving. You will also choose a car with some safety features. You will keep the car well maintained and not drive when the brakes aren't working properly. You will have insurance if you do get into an accident. Thus, many different layers need to break down before you suffer from a catastrophe. I'll enumerate four layers of security which everyone should use. The first three will prevent you from ever being attacked. Even if you go into a war zone, you will usually be invisible and invulnerable to nearly all attackers. The fourth layer deals with the wild "what if" scenario where all three other layers fail.
Layer 1: An Attitude of alert vigilanceThe first layer is: Proper User Attitude. Almost all my clients' security and virus problems come from 2% of my clients. Yes, 98% of the problems come from 2% of my clients. If these 2% acted like the other 98% then they wouldn't get into trouble. You need to act as if you were a responsible adult!Why is it that so many people fail to act as reasonable and prudent adults when online? I think the problem is the fundamental model that people use when thinking about their computers. They think of the computer like a TV set. Both devices contain a screen powered by electricity that connects them to lots of stuff. Both are operated while stationary in a seated position. However the TV is safe (other than potential addiction and brain rot). The computer, on the other hand, can be used as a weapon against you, your identity and others. The proper model is the automobile. It is dangerous. It must be operated vigilantly. You need to be aware that at any moment a child may dart out in front of you, or someone will make a mistake. Over 40,000 Americans die in car accidents every year. This doesn't mean you can't have fun driving, just that you need alert vigilance. Microsoft claims that it removed 72 million malware infections in the second half of 2007 alone. Since it found and didn't remove 58 million, and other antivirus and spyware products removed many, and Microsoft missed many, we can assume at least a few hundred million malware infections per year. This doesn't mean you can't enjoy the Internet, just that you need alert vigilance. You cannot simply turn left from any lane any time, or drive at any speed, or speed through an intersection regardless of the light color and without looking. You must know the rules of the road and how to handle your car. You should keep your car in proper repair. You use seat belts. You take the car somewhere where they check brake fluid and tire pressure. You change the oil. You passed a driver's test. You must think of your computer like a car. It is capable of giving you pleasure, of being useful, but also of getting you into trouble.
Most problems occur because people do things they shouldn't. Yes, I am blaming the victim! If you go to sites where they will let you download the latest movies for free or view pornography for free, or gamble for free, there is a better than even chance you are going to a site that will infect your computer. The company you are going to probably has a business model. If they are charging a user fee, then they have a fee based business model. If they don't seem to have lots of advertising or any visible sign of support, then figure that the support is invisible. Assume they get their money by infecting your computer. According to the FBI, they know of over 1 million computers that are infected and part of Botnets. Notice they are not estimating that there are 1 million computers infected, they are saying they know of 1 million infected computers. If they have found half of them, then there are two million. These infected machines become part of Botnets used to attack competing companies, send out spam, defraud people and steal identities. Do not ever click on links sent to you from unknown companies as spam. Never respond to spam. If an advertisement pops up in your computer or browser DO NOT CLICK IT. This site, provided to us by a bunch of government agencies, does a reasonable job of giving mostly decent advice that could increase the awareness of the naive: http://www.onguardonline.gov/ . If you drive without being vigilant and paying attention, then you are likely to get into an accident. The same is true of surfing the Internet. One of the stupidest security concepts imaginable is from Microsoft; though Microsoft has so many stupid ideas it gives itself tough competition. It is the concept of a "trusted site". If you go into Internet Options in Internet Exposer you'll see you can make sites "trusted". Now, by trusted sites, they mean sites where you can let down your guard. This is like closing your eyes when driving in a nice neighborhood. When you "trust" a site, you are saying that they are not only honest, but they are so technically competent that they could not possibly get infected or compromised. You are attesting to their Internet security competence. Sites that have recently been hacked or corrupted so that visitors viewing the site were infected by merely going there without even downloading or running a program are:
These sites were compromised in April of 2008! Never believe a site could not deliver an infected advertisement or be otherwise compromised.
Layer 2: Close Vulnerabilities
When you close a vulnerability, you become impervious to th thousands of viruses and malwares written to exploit that security hole. Closing a vulnerability is much more effective than trying to stop the thousands of attacks written to exploit it. However, when Microsoft publishes its security updates, it has to tell people why they are doing it. Black hat hackers then look at the libraries that were fixed, and look at the fix and compare them. Within a few hours, they understand the vulnerability that was repaired. Within a few days, they have written viruses and malware to take advantage of those vulnerabilities. Within a week there are hundreds of new attacks aimed at those who haven't updated. Microsoft patches need to be applied within a few days of their being offered or you will be vulnerable. Not only is their operating system getting constantly patched, but their office products are also very frequently attacked and require constant security patches. Last year they issued 26 high-severity patches for office products. They are outstripping that total this year by far. Any program that is exposed to the web is a potential vector of attack. Secunia's online scan will check for known and patched security vulnerabilities in those softwares and alert you of the need to update as well as help you update. They also offer a beta version of their Personal Security Inspector which is even better.
Layer 3: Reduce Your Exposure
Layer 4: Protect Yourself if AttackedThis is what most people think about when they think about Internet safety. It is the last line of defense. It should seldom if ever come into play if you've done everything else right.
If you implement most of the prescribed suggestions in the four layers of security you are unlikely to suffer the ill effects of a malware or virus attack.
Date: May 2008
![]() This article is licensed under a Creative Commons Attribution-NoDerivs 3.0 Unported License. |
||
|