Security Basics mailing list archives
Re: Security Architecture & security tests
From: RichardR <randjunk () gmail com>
Date: Fri, 22 Jul 2005 08:41:49 +0200
Hi Edgar, You can always have a look on these good reading room <http://www.securitydocs.com> <http://www.sans.org/rr> Cheers, On 7/18/05, Edgar Zapata <ezapata () grupodetector com> wrote:
Can anyone provide an URL where I can find a Security Architecture document? And a brief background, please? Thank you and regards. -----Original Message----- From: richardw [mailto:richardw () area52 allserve net] Sent: Friday, November 19, 2004 8:31 PM To: Cesar Diaz Cc: sec-basic list Subject: Re: This time, how secure is Citrix? Food for thought: If the user has a key-logger installed, which is not that uncommon these days with all the mal and spyware getting installed on computers, then the hacker could fire up Citrix from anywhere/anytime and access your user's account. Also, if you are mapping drives, the possibility of spreading viri, worms, etc. is very real. Maybe a solution would be SecureID (hard token) enabled AD? Cesar Diaz wrote:List, I asked a question a few days ago about how secure VPN access is for home users on their own home PCs. I received many helpful answers. Thank you all for that. I also want to ask everyones opinion on how secure remote access through Citrix can be. We use Citrix MetaFrame XP available through Nfuse available thorugh a public IP address. The Nfuse website is secured with 128-bit SSL. Our firewall only allows port 443 to access the server through that IP. The concern now isn't as much the possibility of viruses, worm, etc. spreading since this is not a direct connection to our LAN like a VPN. The concern is that if a hacker has gained access to the users home computer, then they can access the resources on the network that the user accesses. The idea has been floated of running a script when the user connects that deletes their default route to the Internet, then adds a route directly to our network. This should theoretically remove access to their machine from the Internet. We would run an exit script that reverses this so they get their connectivity back. Thanks again for any advice, Cesar Diaz
-- Richard R. IT Soft/System Engineer CNRS/IN2P3/LPNHE Jussieu - Paris VI --
Current thread:
- Security Architecture & security tests Edgar Zapata (Jul 18)
- Re: Security Architecture & security tests RichardR (Jul 22)