HostedDB - Dedicated UNIX Servers

index_19
Auerbach Publications © 2001 CRC Press LLC 08/01 From the point of view of the attacker, the information is simply on the Internet as is the corporate connection; therefore, the access process and medium have not changed, just the level of security. The result is that the information is presented to the attacker, and direct access through a much more complicated path is not required. If it were not for the Internet connection, the remote hosts would have increased func- tionality, speed, and protection compared with legacy remote access with modems. Regrettably, the Internet is the link to the extended func- tionality as well as the link to ultimate insecurity. Logically, this is a disaster for information security. We have invested monumental amounts of time, research, and money into the evolution of security and the mitigation of risk associated with connecting to a global, unrestricted network. We have built massive walls of security with bricks of technology ranging from basic router filtering, firewalls, and intrusion detection systems to system hardening, DMZs, and air-gaps. Now that we have a plethora of defense mechanisms pointed at the Internet, we are EXHIBIT 7 — Attacker Obtains Data From a Much Less Protected Point on the Internet Internet Firewall Remote User Established Security Envelope Attacker Phone Cable xDSL Data is Accessed or Copied from Protected Network Attack against an Unprotected System on the Internet Internet Network