Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL

Chapter 3. Planning Your SBS Network > Planning for Security

3.3. Planning for Security

It is far easier to implement effective security measures to protect your SBS network if you plan for security before you actually start installing software. In the following sections, we’ll cover some of the most common attack vectors and the preliminary steps you can take in this planning stage to prepare your defenses:

  • Careless or disgruntled employees and former employees Internal users and former users are the biggest risk factors to data loss and data theft on most computer networks. Whether from laziness, disregard of security policies, or outright malice, the internal user is often the most dangerous on your network. To help reduce risks related to this, refer to the Section 3.3.1 section of this chapter as well as to Chapter 8.

  • Internet hackers All computers and devices attached directly to the Internet are subject to random attacks by hackers. According to the Cooperative Association for Internet Data Analysis (CAIDA), during a random three-week time period in 2001 more than 12,000 DoS attacks occurred: 1200–2400 were against home computers and the rest were against businesses. If your organization has a high profile, it might also be subject to targeted attack by hackers who don’t like your organization or who are engaging in corporate espionage.

    For more information about securing a network against Internet hackers, see the Section 3.3.4 section of this chapter.

  • Wireless hackers and theft of service Wireless access points are exposed to the general public looking for free Internet access and to mobile hackers. To reduce this risk, refer to the Section 3.3.3 section in this chapter.

  • Viruses and worms Networks are subject to virus exposure from email attachments, infected documents, and worms such as CodeRed and Blaster that automatically attack vulnerable servers and clients. Refer to the Section 3.3.2 section of this chapter for more information.


You are currently reading a PREVIEW of this book.


Get instant access to over $1 million worth of books and videos.


Start a Free Trial

  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint