1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Legacy systems that security newbs need to watch

Discussion in 'CSO' started by RSS, Jul 14, 2016.

  1. RSS

    RSS New Member Member

    Even though technology changes every day and the security ecosystem of most enterprises demands constant updates and layers, there are some legacy systems that security newbs should know how to handle simply because they just work.

    Greg Hoffer, vice president of engineering at Globalscape, said that even those these systems have been around and deployed long before those who are fresh out of school and entering the security industry were born, the newbs still need to understand and watch these legacy systems.

    • FTP Servers –Though decades old, they serve their purpose very well. Often legacy systems exist in the deep dark corners that people don't know about. FTP in and of itself is not secure. There are still a lot of people who move information around the internet without any security, and this might cause threat vectors or risks. Many FTP servers are homegrown, some lie open and unknown.
    • Fax machines – An old technology, but they are still very widely used for many business transactions, including health and finance, while being incredibly insecure both digitally and physically. The scariest part of that is that there has been transition from machine to voice over IP, so the data itself is effectively flowing over these insecure channels.
    • Modems – These are even older than fax machines, but a little younger than FTP servers. Currently, they are probably not as big of an issue as they were in the late 80s to early 90s. Often they were for one specific purpose. A company leased a line that went from a bank to the information provider. Sometimes, though, modems are a 2-in-1 machine with both fax and modem. Modems can allow a form of access into a computer that is otherwise protected by firewalls and all other technologies to make sure no one gets into your network. They remain an attack vector in some companies where modems sit in a dark corner and nobody knows it.
    • Industrial/manufacturing control systems. These are SCADA systems (or other like systems) that are often found at large industrial or manufacturing plants. They monitor turbines that power electricity through steam, or nuclear power processing plant. While they are secure to the best degree through aircaps. The systems are hardwired and have no connection between the controls and internet. In reality, though, there have been reports that show that with wifi networks the SCADA systems are connected and vulnerable.
    • Environmental controls--There are older systems that are somewhat comparable to today's IoT. One of Globalscape's customers uses a software to manage heating and AC on top of Buckingham Palace. The system was likely installed 15 years ago, but it may have connectivity of some sort. They are using mechanisms to remotely access controls on that system so that folks aren't climbing up to the palace roof. Instead, they are using FTP to get sensor data. The vulnerabilities of these types of systems are surprisingly similar to the IoT vulnerabilities seen today.

    Certainly there are the more modern environmental controls that have gotten some press with the explosion of IoT. These too can't be ignored. Even devices that consumers use in order to have remote access over their homes can pose security risks to the enterprise.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page