|
|
CAD
Hi GUYS!
Not long time back building designs & drawings was a pain in the neck by the hand using the conventional pen and paper on a drafting table.
This soon changed with the advent of the desktop computer, which gave rise to Computer Aided...
eSolution: software developments
e Solution is a corporation working in the IT field with an experienced, qualified, enthusiastic, and professional staff. e Solution is ready to apply the most advanced technology to help your enterprise to approach and take advantage of e solutions...
Important Steps to Protect your Computer from Hurricanes
Having lived in West Central Florida for the past 15 years, I’ve been given some insight into the sometimes scary reality of Mother Nature. This past summer I’ve had the displeasure of meeting four characters, first hand...Charley, Frances, Jeanne...
Improve PC Performance - 6 Tips You Must Know
Are you frustrated with your PC? Is it feeling sluggish or crawling at a snail's pace? Are programs running slower than they used to? Are you just plain fed up with frequent slowdowns, freezes or crashes? Then it's time to stop what you're doing...
Seecrets On Security: A Gentle Introduction To Cryptography
With the increasing incidence of identity thefts, credit card frauds, social engineering attacks, the digital world is facing challenges in the years ahead. Obviously, cryptography, a young science, will play a prominent role in the security of...
|
|
|
|
|
|
|
|
Why Network Documentation Is So Important
You may reprint or publish this article free of charge as long
as the bylines are included.
Original URL (The Web version of the article)
------------
http://www.defendingthenet.com/newsletters/WhyNetworkDocume
ntationIsSoImportant.htm
Title
------------
Why Network Documentation Is So Important
Undocumented Networks
------------
I can't tell you how many projects I've worked on in which the
customer has little to no network documentation. The reason for
the lack of network documentation is varied. In many cases this
is both the fault of the customer and the vendor / consultant
who designed and implemented the network. The vendor just does
not do it and the customer does not press hard enough for it. In
some cases, technology consultants do not feel it's important
enough or want to lock the customer into having to call "them"
if something goes wrong or a configuration needs to be changed.
Not only is this poor practice on the side of the consultant, it
can have a dramatic affect on the future growth of the customer,
increase the costs of future network upgrades and diagnostics,
and can negatively impact the security of the customers network.
The Results Of A Undocumented Network
------------
Before I tell you the basic items that need to be documented
with regards to computer networks, I first want to give you
examples of what I have "not" seen documented, and what problems
this has caused.
During one of my past projects, which was primarily to implement
a new firewall and to secure many of the internal systems , I
ran into some really incredible issues. None of the primary
server systems were documented. No one knew what server did
what, how much memory, disk space, what type of processor(s),
and in some cases, did not know what Operating System was
installed. And worse than that, during my initial review, we
located three servers in a closet, on a different floor, that no
one even knew existed!
Because of the lack of network documentation, no one knew what
was suppose to be done to maintain their enterprise Anti-Virus
system. When I finally determined what the admin password was to
login to the Anti-Virus services, I found that virus signatures
had not been updated in over six months. Then we found that the
system was not even functioning and nearly 90% of systems on the
network were infected with virus and worms (and not the annoying
kind either, the destructive kind)
We also found there were four different tape backup servers, and
again, because of the lack of network documentation, none of
them had been maintained. The customer just kept changing tapes.
And do you know what, none of the backup jobs had been running
for months. Talk about a false sense of security!
The very last thing I want to talk about is how lack of network
documentation and procedures can affect network security. In one
case, a customer had a rather expensive Check Point Firewall in
place. No documentation was available and the customer had been
told that nothing needed to be done to maintain the Firewall.
The customer told me that recently, their Internet access had
become very sluggish. It took two days to locate the Check Point
console password. When I logged in I found that the C: drive had
absolutely no free disk space because the Firewall log had
consumed it all. This could have been
avoided if the Firewall
was setup properly in the first place. The Firewall was also
about 4 Service Packs behind, and the rules in place were quite
inadequate. Not to mention that none of the rules themselves had
been documented. And one more thing to think about. If this
network had been attacked and compromised, how quickly would we
have been able to respond to the attack if so much of the
network was undocumented? It would have been a disaster.
Basic Network Documentation
------------
Here is a basic set of items that should be contained in network
documentation:
All server hardware and operating systems should be documented,
including the physical locations and what primary, secondary,
etc.. purpose they serve. All key service accounts an login
account user-id and password's should be documented and stored
in a safe location, maybe a company lockbox or vault, or use
something like KeyPass to store them. A visual diagram of the
network layout, even from a high level, should exist no matter
how small or large the network is. Products like WhatsUpGold can
assist with this or you can create a Visio diagram of the
network. Procedures on how to maintain the network technology,
including Operating Systems, security related services, backup
and disaster recovery (business continuity), and firewall
technologies should exist. Additionally, you should document and
secure all Operating System and application licensing. This is
something that is very often overlooked and is imperative if you
have to recover from a disaster situation in which the rebuild
of systems is necessary. Other information to have documented is
key contact information. For instance, who do you call if your
Internet connection goes down? Who do you contact if your
offsite web services are not functioning? Do you have a third
party that maintains your Domain Name Services (DNS)? If you
have custom applications, do you know exactly who you must call
if there is a problem?
The above is just the basic items that need to be documented
within a computer network. There are many more aspects to
network documentation.
Who Needs To Document Their Network
------------
In a nutshell, anyone who has a computer network, home office,
small office, or large office, should have an adequate level of
network documentation and procedures to follow in order to
maintain the network. If you have invested in network
technology, don't you want to keep your investment safe, sound,
and performing at it's peak?
Conclusion
------------
If you are a customer, and have a systems integrator or
consultant working on a new network implementation or upgrading
an existing one, demand that they provide you with complete
network documentation. Even if it costs you extra you should
request it. It will save you a lot of time and money in the
future. And, it may actually keep your business from
experiencing long periods of down time.
About the author:
About The Author
------------
Darren Miller is an Information Security Consultant with over
sixteen years experience. He has written many technology &
security articles, some of which have been published in
nationally circulated magazines & periodicals. If you would like
to contact Darren you can e-mail him at
Darren.Miller@ParaLogic.Net. If you would like to know more
about computer security please visit us at http://www.de
|
|
|
|
|
Tom's Hardware |
: Tom's Hardware Guide is the Internet's premiere resource for hardware news and reviews. |
www.tomshardware.com |
  |
HardwareCentral - Your source for in-depth computer hardware info. |
HardwareCentral is the #1 Hardware Information Resource on the 'Net. Featuring over 600 pages of Hardware information, including advice on System ... |
www.hardwarecentral.com |
  |
Apple - Hardware |
Find your favorite Mac, iPod and other Apple accessories. |
www.apple.com |
  |
Ace Hardware |
Nationwide (United States) hardware and home improvement retailer. Includes products, dealer locator and corporate information. |
www.acehardware.com |
  |
Computer hardware - Wikipedia, the free encyclopedia |
The hardware of a computer is infrequently changed, in comparison with software and ... Personal computers, the computer hardware familiar to most people, ... |
en.wikipedia.org |
  |
Hardware - Wikipedia, the free encyclopedia |
Hardware is the general term that is used to describe physical artifacts of a technology. ... In a looser sense, hardware can be major military equipment, ... |
en.wikipedia.org |
  |
Open Directory - Computers: Hardware |
Hardware Central - Computing-centric community providing vital information, support, tools and interaction facilities for power computer users and ... |
dmoz.org |
  |
Microsoft Hardware – Home Page |
Learn about Microsoft mice, keyboards, desktop sets, webcams, media center peripherals, gaming products, fingerprint readers and presentation tools. |
www.microsoft.com |
  |
AnandTech: your source for hardware analysis and news |
Independent hands-on reviews of computer hardware such as motherboards, graphic cards, and CPUs. |
www.anandtech.com |
  |
hardware.com - Routers, switches, firewalls, servers, memory ... |
Supplier of new and refurbished networking hardware and approved and compatible network accessories. Located in the United Kingdom. |
www.hardware.com |
  |
Slashdot: News for nerds, stuff that matters |
From the article: "Although the news caused barely a ripple of reaction in the audience of software and hardware engineers, there are industry analysts who ... |
hardware.slashdot.org |
  |
InformationWeek HardwareTech Center |
Our hardware coverage ranges from mobile computers and PDAs to servers and supercomputers, and the infrastructure issues enterprises deal with every day. ... |
www.informationweek.com |
  |
What is hardware? - A Word Definition From the Webopedia Computer ... |
This page describes the term hardware and lists other pages on the Web where you can find additional information. |
www.webopedia.com |
  |
Google Directory - Computers > Hardware |
Hardware Central - http://www.hardwarecentral.com/ Computing-centric community providing vital information, support, tools and interaction facilities for ... |
www.google.com |
  |
Gifts: Unique Gifts & Gift Ideas at Restoration Hardware |
At Restoration Hardware, you'll explore an exceptional world of high quality unique gifts. Browse our products to find gift ideas & more at Restoration ... |
www.restorationhardware.com |
  |
HwB: The Hardware Book |
HwB provides you with circuits, pinouts, cable/adapter descriptions and other technical information. |
www.hardwarebook.net |
  |
Reg Hardware: Product News and Gadget Reviews from The Register |
More Gadgets Stuff. 5th December 2006 12:09 GMT. Author: Reg Hardware ... 27th November 2006 15:31 GMT. Author: The Hardware Widow ... |
www.reghardware.co.uk |
  |
red hat hardware compatibility lists |
hardware.redhat.com/ - Similar pages |
|
  |
TrueValue.com |
Here's our tip to hang strands of lights with ease. Jeanenne & Jim Tucker Plantation True Value Hardware Richmond, TX ... |
www.truevalue.com |
  |
A complete illustrated Guide to the PC Hardware |
A complete illustrated Guide to the PC Hardware, Logic and Architecture. 500 easy-read articles about the modern PC. Understand the basic architecture of ... |
www.karbosguide.com |
  |
|