Archive for May 26, 2005

Vulnerabilities

VulnerabilitiesNetwork edge devices: border routers with their admin interfaces open, so people can manage them from home, but so can anyone else

Networked printers/copiers: have IP addresses without VLANs, making them a convenient and undefended jumping-off point to the whole network.

Web servers and Web applications: With Web servers sitting off the firewall in a demilitarized zone (DMZ), they can often be the ideal gateways to internal company processes. Web servers without patches and passwords are common. Three-quarters of hacker attacks are on Web servers since that’s what’s out there. This is particularly dangerous with the proliferation of Web applications. Attacks have typically moved up into the application layer, and that’s one of the hardest things to protect against because there are no one-size-fits-all solutions. The danger, of course, is that Web applications typically connect attackers into your databases, and that can be a huge problem.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Vendor Speak

Vendor SpeakAccording to CIO Magazine article (CIOInsight, May, 2005, p. 20) by David Weindenfled, counsel for McDonald’s.

They say

They mean

“usual and customary”

“Whatever the vendor has been getting away with”

“commercially reasonable”

“Whatever the vendor considers reasonable”

“for internal business use only”

“software may not necessarily be used by your business partners or companies that you merge with or acquire”

“the current or then in effect”

“vendor can change the fees and service levels whenever it wants”

“will perform in accordance with the published specifications”

“product performs according to the vendor’s technical specifications, but not your company’s business needs”

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.