* Firewalls, wireless security and perimeter security Let’s take it as given that we’ve all agreed it is part of our job to secure our networks from the scum who not only want to launch worms and viruses but also those who want to break in and steal what they can. Whether or not we agree on where the blame for the problem should be placed, it’s still necessary for us to take what steps we can to minimize or even prevent the damage.We’ll divide this very large subject into three more manageable sections:1) Strengthening the borders (firewalls and their ilk).2) Maintaining the infrastructure (patch and update management). 3) Preventing disease (worms and viruses).Today we’ll look at border security, in particular wireless, firewall, and perimeter security. You’d probably notice if someone walked in to your wiring closet and plugged a computer into one of your hubs or switches. But what about your wireless access points? (If you don’t have wireless access to your network, you should read this anyway – you will have wireless soon.)Those of you with wireless and have instituted Wired Equivalent Privacy (WEP), the standard encryption method for 802.11 wireless connections, and are feeling smug about it should read “Wireless LAN Authentication” by Steve Riley, senior consultant for Microsoft’s Trustworthy Computing Services. He says: “Certain flaws in the implementation of RC4 encryption in WEP … permit an attacker to determine the encryption key and gain access to a wireless network after capturing some data and passing it through commonly-available key generation programs.” Read his article at https://www.microsoft.com/technet/columns/security/askus/auas0303.asp for more on how to secure wireless.You all have firewalls, right? Do you know what they do? Do you know how effective they are? Most firewalls act like a padlock service on a building. They block some doors and windows while leaving the main ones open. They can also be used to examine the credentials of things entering your network from outside as well as providing gatekeeper services to prevent users from venturing outside your protected environment. But they do come in all sorts of types, sizes, shapes and functionality. One size does not fit all. A good review of what’s available, how it works and who should use which types for the best protection can be found at https://www.microsoft.com/technet/security/prodtech/network/firewall.asp .If a firewall is the network equivalent of a building’s windows, doors and locks then “perimeter security” is the equivalent of an alarm system. Put another way, firewalls are useful for intruder prevention while perimeter security deals more with intruder detection. You may be logging and auditing all sorts of access to your network but unless someone is being alerted to potential problems, all you’ll end up with is a record of your security failures. Go to https://www.microsoft.com/technet/security/prodtech/network/ where you’ll find literally hundreds of suggestions about various ways to secure and protect the edge of your network from attack. This should be required reading.Next time, we’ll look at some maintenance issues. Related content feature 5 ways to boost server efficiency Right-sizing workloads, upgrading to newer servers, and managing power consumption can help enterprises reach their data center sustainability goals. By Maria Korolov Dec 04, 2023 9 mins Green IT Green IT Green IT news Omdia: AI boosts server spending but unit sales still plunge A rush to build AI capacity using expensive coprocessors is jacking up the prices of servers, says research firm Omdia. By Andy Patrizio Dec 04, 2023 4 mins CPUs and Processors Generative AI Data Center feature What is Ethernet? History, evolution and roadmap The Ethernet protocol connects LANs, WANs, Internet, cloud, IoT devices, Wi-Fi systems into one seamless global communications network. By John Breeden Dec 04, 2023 11 mins Networking news IBM unveils Heron quantum processor and new modular quantum computer IBM also shared its 10-year quantum computing roadmap, which prioritizes improvements in gate operations and error-correction capabilities. By Michael Cooney Dec 04, 2023 5 mins CPUs and Processors High-Performance Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe