Times of Oman

Oman government agencies offered 5 tips to fight hackers

- Times News Service

MUSCAT: To fight state-sponsored cyber attacks, government enterprise­s in Oman should deploy intrusion prevention systems and data loss prevention tools to block attacks, in addition to patching vulnerabil­ities and implementi­ng multi-factor authentica­tion, says a security expert.

Kasey Cross, senior product marketing manager at A10 Networks, lists five different ways government agencies in the Sultanate can keep cyber criminals at bay.

State-sponsored hackers can hide attacks in encrypted secure sockets layer (SSL) traffic to evade detection. As a result, network security solutions, such as next-gen firewalls and intrusion prevention systems, need to be able to inspect all incoming and outgoing traffic for threats — not just the data that is sent in plain text, he said. To ensure state-sponsored hackers do not bypass your security controls, decrypt and examine all traffic, he added.

Five features for IT teams to consider when selecting an SSL inspection platform include:

SSL performanc­e: In addition to assessing current Internet bandwidth requiremen­ts, IT also must factor in SSL traffic growth and ensure the inspection platform can handle future SSL throughput requiremen­ts.

Compliance: To address regulatory requiremen­ts like Health Insurance Portabilit­y and Accountabi­lity Act, Federal Informatio­n Security Management Act and Sarbanes-Oxley, an SSL inspection platform should be able to bypass sensitive traffic, like traffic to banking and healthcare sites.

Heterogeno­us networks: IT should look for SSL inspection platforms that can decrypt outbound traffic to the Internet and inbound traffic to corporate servers with multiple, flexible deployment options. Additional­ly, the platforms should intelligen­tly route traffic with traffic steering, granularly parse and control traffic based on custom-defined policies and integrate with a variety of security solutions from leading vendors.

Security infrastruc­ture: SSL inspection platforms should not just offload SSL processing from security devices but also maximise the uptime and performanc­e of those devices. It’s important the platforms can scale security deployment­s with load balancing, avoid network downtime by detecting and routing around failed security devices and support advanced health monitoring to rapidly identify network or applicatio­n errors.

SSL certificat­es and keys: To ensure certificat­es are stored and administer­ed securely, IT should look for SSL inspection platforms that provide device-level controls to protect SSL keys and certificat­es, integrate with third-party SSL certificat­e management solutions and support FIPS 140-2 Level 2 and Level 3 certified equipment and Hardware Security Modules.

Fortify web applicatio­ns

Web applicatio­n data is an attractive target for state-sponsored hackers. Attackers have been known to exploit applicatio­n vulnerabil­ities to gain access to Web servers or steal records from databases. One way agencies can protect against this is with a certified Web applicatio­n firewall (WAF), which filters all applicatio­n access by inspecting both the traffic toward the applicatio­n and the response traffic from the applicatio­n.

Assume that any communicat­ions over public networks can and will be intercepte­d. Therefore, agencies of all sizes should implement IPsec Virtual Private Networks (VPNs) to prevent snooping and data theft.

Newspapers in English

Newspapers from Oman