Tag Archive for Networking

2/3 K-12 Networks Breached Multiple Times

2 of 3 K-12 Networks Breached Multiple Times a YearPanda Security, a provider of cloud-based security software, recently released a report that says 63 percent of K-12 schools experience malware outbreaks or unauthorized user access at least twice a year.  The report, Kindergarten-12 Education IT Security Report (PDF), had some other interesting infobits.

Personal devices on K-12 networks

The survey reports that eighty-two percent of schools allow students and staff to connect personal computers and laptops to the school network. Panda says schools recognize outside devices introduce external risks, but they struggle to fully integrate security policies for multiple devices. Only 74 percent of districts are monitoring the use of external devices. Fifteen percent fail to take any extra security measures, leaving those school systems more vulnerable to infection.Pamda Laptop chart Most schools have implemented IT security best practices, there is still room for improvement reports Panda. The report says ninety percent of schools install anti-virus and/or anti-malware on computers, but nearly 25 percent fail to use firewalls, block high-risk websites, or employ user authentication. 86% prevented the use of very risky websites; while 89% mandated users install security software on their systems. Further, 15% of respondents acknowledged that there weren’t any extra security measures in their districts if they wanted to use laptops.Panda Best Pratices

Social media threats

Social media is a top concern for schools, but the stringency of school policy varies greatly. Ninety-five percent of schools have a social media policy in place, citing the mitigation of malware-related risks as the main reason for implementation. Twenty-nine percent of schools allow students unlimited access to social media sites, while 32 percent deny students access altogether.

Panda Social MediaSchools lack the funding to be secure. I have always said that schools face attacks from the inside and the outside. Insiders in a K-12 school network range from technically unsavvy to damn good malicious attackers. Despite this, the report says 72% of schools reported that budget limitations were the main obstacle, to better security and 38% reported non-availability of staff, and 29% of the schools, reported their IT staff had to attend to other more important tasks than IT security.  IT administrative staff at 38 percent of schools report removing viruses or malware from IT systems a few times a week, and 21 percent are doing this daily according to Panda.

With malware on the rise and new threats propagated through social media every day, having the right security tools in schools has never been more important. Security issues consume staff time, diverting attention from the business of education. Help Net Security quotes Rick Carlson, president of Panda Security US, who has a great grasp of the obvious, “While the Internet is an invaluable tool for education, it can cause serious interruptions to day-to-day operations if schools fail to properly address security concerns.”

rb-

Just to prove the point, the Oakland Press is reporting that 4 students at Romeo High School in Romeo, Michigan were caught allegedly intercepting 60 staff members’ emails, including the Superintendent after “something goofy” happened to the website. While I have no first-hand knowledge, the news did say the attackers went after people who read their emails on their cellphones. So more than likely it was some kind of Bluesnarfing attack, maybe including a Cain and Able payload to get at passwords.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Obituary for a Former Network Force Novell

Obituary for a Former Network ForceNetworking pioneer Novell ceased trading on NASDAQ 04-27-11 and will be delisted, which is a sad ending for an outfit that was once one of the big names in networking. Novell completed its previously announced merger, whereby Attachmate bought it for $6.10 per share in cash and the sale of certain identified issued patents and patent applications to CPTN Holdings for $450 million in cash. Attachmate, which started as a terminal emulation company (I spent a lot of time configuring the green screen emulator as a newbie network guy) in 1982, is privately held. ZDNet says the primary owners are the private equity firms Francisco Partners, Golden Gate Capital, and Thoma Bravo. The Attachmate side of the company still works in X Window and terminal emulation.

Novell logoWhen the company started up in Utah in 1979, it was a hardware company making CP/M based gear and had to be rescued from bankruptcy by a last-minute fund-raising effort. In January 1983, Ray Noorda headed the firm and introduced the multi-platform network operating system (NOS), Novell NetWare.  Originally NetWare ran on a Motorola 6800 CPU supporting 6 MUX ports per board for a maximum of 4 boards per server using a star topology with twisted-pair cabling.  Novell based its network protocol on Xerox Network Systems (XNS), and developed what it called the internetwork packet exchange (IPX) and sequenced packet exchange (SPX).

By 1990, Novell was the only choice for any company which wanted to run a network. In 1993, the company bought Unix System Laboratories from AT&T (T), with the idea of challenging Microsoft. The next year it bought WordPerfect, as well as Quattro Pro from Borland to give it an Office package. Taking on Microsoft (MSFT) did not work out so Novell sold off WordPerfect and Borland off by 1996.

Novell tries to buy its way into new markets

Attachmate logoIn 1996 it pushed into internet-enabled products and a TCP/IP stack. The result was the excellent NetWare v5.0 (Which I installed over 30 of), released in October 1998. But by 1999 Novell had lost its dominant market position, and was continually being out-marketed by Microsoft. Novell focused on net services and platform interoperability, but products like DirXML, failed to set the world alight. Between 2002 and 2003, Novell tried to buy its way into new fields, particularly Linux in November 2003, Novell acquired SuSE.

Although Novell did not stop releasing products, it did not do as well as it hoped. Its Linux business grew slowly but not enough to make up for the lack of revenue from Netware. It then scored its own goal by signing a deal with Microsoft to cover patents on Linux. This angered the Open Source community, which had seen itself at war with Microsoft. In November 2010 Novell agreed to be acquired by Attachmate for $2.2 billion. Attachmate said it will split Novell into two units, one being SUSE.

Less than a week after completing its acquisition of Novell, Attachmate has laid off as many as 700 to 800 of Novell’s employees. According to Utah’s Daily Herald, many of the jobs that are being lost will be in the human resources, finance, accounting, and legal departments, as well as under-performing departments.

rb-

In the interests of full disclosure, I do did hold Certified Novell Engineer certifications CNE3, CNE4, and CNE5 certs. Now that the deals are done, we’ll have to see if Attachmate lives up to its promises to keep supporting NetWare and Linux.

What do you think?

Does Novell even matter anymore?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

iPad Driving Wireless Networks

iPad Driving Wireless NetworksJuniper (JNPR) recently loosened up its purse-strings and bought Trapeeze Networks to fill the most obvious hole in its product line. Juniper purchased the WLAN vendor from Belden (BDC) for $152 million in cash. The Belden/Trapeeze relationship is something I never got, when I think Belden, I think cable, and connectors not wireless. NetworkWorld cites Gartner “…more than 60% of end-users purchased their WLAN solutions from the same vendors as their wired LANs, meaning that Juniper has likely been leaving a lot of opportunity on the table.”

David Yen, executive vice president, and general manager, Fabric and Switching Technologies, at Juniper (and owner of possibly the longest title in networking), told NetworkWorld that the industry is much more mobile, “it was time for us to include wireless.” GigaOm says that the purchase was a recognition by Juniper that the enterprise networks were going through a sea change, thanks in part because of a big upsurge in the number of mobile devices connecting to corporate networks. This proposition is backed up by a survey by BoxTone Mobile Service Management which found that 73% of the surveyed companies intend on deploying the Apple (AAPL) iPad as well as other iOS devices for use on their network within the next 12 months, with 25% of those companies set to deploy right away. More than 50% of those surveyed plan on deploying their own iPad app within the next 12 months, while 25% of those plan on deploying as many as three of their own iPad apps.

IT executives interviewed by WindowsITPro.com argue that the iPad isn’t for everyone, but is very well suited for users that consume more content than they produce, such as, e-mail and corporate documents. Another area where the iPad seems to be making inroads into corporate IT is as a device that displays content for cloud and software as a service (SaaS) business solutions.

Some of the iPad initiatives include:

  • Mercedes-Benz is using iPads on showroom floors according to ZDNET. MB uses the iPad to present and execute the various financing options for customers without having to go sit down in an office.
  • SAP the world’s largest business software developer has released an iPad app so that its customers can access their reports and corporate data with the iPad. ZDNET reports that SAP is also using and supporting iPads internally. Rob Enslin, the North American president at SAP, says that he now carries an iPad instead of a laptop when he travels. “It’s allowed me to almost run a paperless office,” said Mr. Enslin. He said that he uses the iPad to view business apps, briefing documents, customer information, and other corporate data.
  • ServiceMax has developed an iPad app for pushing the device as a modern solution for field service applications according to WindowsITPro.com
  • Rackspace has developed a configuration management tool for cloud data centers according to TechWorld

Dominic Orr, CEO of Aruba Networks (ARUN), told GigaOm that his firm expects to see future demand coming from corporations who are seeing a big shift in the way their networks are being used. “The network model has shifted from hotspots to ubiquitous and uniform networks access,” Orr said. Companies now want wireless access not only in boardrooms and hubs of productivity but also in stairwells, corridors, kitchens, and other areas. Why? Because the devices accessing the network are entirely different, he pointed out. “Our demand is being driven by smartphones and smartpads,” he said. In the past, laptops were used for wireless access, but it was difficult to walk around and use them as easily one can use a smartphone or an iPad. The smart devices, however, encourage anywhere computing, which, in turn, puts a different load on the networks.

Mr. Orr goes on to say that iPads and tablets are very multimedia-centric, which means folks are looking for good, solid, and even coverage across their entire campus, and not just in certain specific areas, Mr. Orr pointed out. “While netbooks and laptops have wired Ethernet built into them, the new smart devices can only access the Internet via mobile connections,” he added. “You either have 3G or Wi-Fi.” These demands for improved coverage have led the research firm Dell’Oro Group to estimates that the enterprise WLAN market will grow from $2.2 billion in 2010 to $3.4 billion in 2014.

Steve Jobs loves his iPad

rb-

The iPad, and many new and emerging consumer devices, only have Wi-Fi connections network teams are going to face many challenges in the face of iPad adoption. Wi-Fi networks are viewed as a utility by employees, who expect to connect any device to any network to get connected. Underscoring a major societal and cultural trend of the connected lifestyle, Enterprise adoption of the iPad is part of the larger trend of consumerization of IT (which I have written about here, here, and here) in which companies are allowing employees to choose which tools they use.  The negative consequences of not allowing users to choose the products they want to use themselves simply aren’t worth it, according to Karl Ageberg, CIO at Lund University in a PCWorld article. That movement will also open the door to competing products from a growing number of Android-based tablets and Research In Motion’s upcoming PlayBook.

Some of the ways  iPads will force changes:

  • Internal IT security to deliver secure access methods for all consumer devices in general.
  • Security policy changes, to offer secure and controlled access to corporate data.
  • Network and application security design, to provide secure and controlled access to corporate data.
  • Network management to make sure mission-critical devices and applications get the required QoS and SLA required.
  • Mobile device management platforms ability to control access and storage of sensitive corporate data on these devices.
  • Support for consumer devices, owned both by the organization or by individuals.

Has the iPad breached your IT walls?

How has the iPad changed how you do business?

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Do You Know Where Your IPv6 Is?

Do You Know Where Your IPv6 Is?Earlier, I covered the iSuppli announcement that nearly 3 out of every 4 people on Earth will soon own a mobile phone. Now, this factoid has some consequences. Johannes Ullrich, PhD, chief research officer for the SANS Institute is predicting that the arrival of new and upgraded IPv6-enabled operating systems, can open new and unrecognized security weaknesses in otherwise secure environments.

SANS Institute logo

Dr. Ullrich told Net Security, “One of the problems is the accidental implementation of IPv6. You may already have IPv6 on your network without knowing about or configuring it.” He continues, “Windows 7, OS X, and Linux enable it by default. In the last round of operating system updates, it has tended to be turned on by default.” Dr. Ullrich, who is currently responsible for the SANS Internet Storm Center (ISC), also highlights devices running Apple’s IOS such as iPhone as well as some Google Android devices come with IPv6 enabled by default.

Dr. Ullrich says that the growth of mixed IPv4 and IPv6 networks, sometimes without the knowledge of IT security teams, can introduce a variety of potential security risks. Attacks designed to exploit IPv6-enabled devices could also be missed by security teams not looking for  IPv6 traffic, “Many organizations will look at their own networks and not see a big problem staying on IPv4,” he explains.

According to Net Security, Ullrich believes that organizations have failed to grasp the full impact of a move to IPv6 or the amount of time needed to plan, test, and secure any migration strategy. Ullrich believes that it will take at least about a year for larger organizations to move over to IPv6. Although most modern routers and switches are capable, supporting SIEM, IDS, IPS, and monitoring tools will need reconfiguration. The application layer is more problematic according to the SANS Institute expert  “It is comparable to the Y2K problem, and there may well be many complex or custom applications that are affected by switching over that need to be tested.”

This gadget has been developed by Takashi Arano, Intec NetCore

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Terabit Ethernet Developing

Terabit Ethernet DevelopingResearchers at the University of California, Santa Barbara (UCSB) are working on the next evolution of Ethernet – Terabit Ethernet. UCSB Professor of Electrical and Computer Engineering Dan Blumenthal told LightReading that the goal of the recently created Terabit Optical Ethernet Center (TOEC), is to create Terabit Ethernet (TbE) which runs at 1 trillion bits per second by 2015 and to follow it up with 100Tbit/s Ethernet by 2020.

Professor Blumenthal explained to LightReading that he wants the TOEC and its partners to produce something the industry can use, not a one-time lab experiment that only works with duct tape and glue. “We’re not talking about lab hero experiments,” Blumenthal told LightReading. The real-world focus of TOEC has helped attract partners like  Agilent Technologies Inc. (NYSE: A), Google (NASDAQ: GOOG), Intel Corp. (NASDAQ: INTC), Rockwell Collins Inc., and Verizon Communications Inc. (NYSE: VZ) to help with the research. I wrote about Intel’s TBPS efforts back in July.

Terabit Ethernet is hard

TOEC could probably use the help because developing TbE is looking like no simple task according to LightReading. Bob Metcalfe, Ethernet’s creator, and now a Polaris Venture Partners partner, speculated two years ago that a terabit standard might need a rethinking of everything, even the fiber itself.

Based on current UCSB research, professor Blumenthal speculates that TbE  may include:

  • Photonic integrated circuits (PICs) are a must.
  • Coherent receivers, but at a scale well beyond what’s being used for 100Gbit/s Ethernet. A likely candidate is 1,024-QAM: quadrature amplitude modulation (QAM) transmitting 10 bits per symbol, a scheme likely to require 100GHz electronics.
  • To make that coherent receiver energy-efficient, TOEC is “trying to move a lot of what’s in the digital signal processor into the optics,” Blumenthal says.
  • New materials for fiber-optics aren’t out of the question. “We won’t start out with that, but it’ll move in that direction,” Blumenthal says.
  • Other items on the TOEC shopping list include optical phase-locked loops, new semiconductor optical amplifiers (SOAs), and methods for drastically lowering on-chip optical losses.

The questions go beyond the optical layer. To make operations more synchronous padding and frame delineation were added to 10Gbit/s and 100Gbit/s Ethernet, Blumenthal pointed out. “Do we keep doing that? Or do we go purely asynchronous? We don’t know yet. …Once you put the word ‘Ethernet’ in there, it’s not about just transmission. It’s about being backward-compatible. That’s the beauty of Ethernet. We can’t lose that essence.

rb-

The need for TbE is real (I first wrote about Intel’s TbE efforts here) and being driven by video. More video is already riding over existing networks. “We’re going to need much faster networking to handle the explosion in Internet traffic and support new large-scale applications like cloud computing,” Professor Blumenthal told Physorg. Stuart Elby, Vice President of Network Architecture for Verizon told Physorg, “Based on current traffic growth, it’s clear that 1 Terabit per second trunks will be needed in the near future.”

Facebook is already looking at TbE in their data centers. PCWorld reports that at the Ethernet Alliance‘s Technology Exploration Forum, Donn Lee, a Facebook Engineer said, “… there is already a need for 1 terabit.” Facebook has so many servers, and those servers can process data so fast, that they could fill 64 Terabit Ethernet pipes in the backbone of one data center, Lee said.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.