Article jan2007.tar

syslog

The SANS Institute recently released its annual list of the Top 20 Internet Security Attack Targets. The listed vulnerabilities are as follows:

Operating Systems

    W1. Internet Explorer
    W2. Windows Libraries
    W3. Microsoft Office
    W4. Windows Services
    W5. Windows Configuration Weaknesses
    M1. Mac OS X
    U1. UNIX Configuration Weaknesses

Cross-Platform Applications

    C1. Web Applications
    C2. Database Software
    C3. P2P File Sharing Applications
    C4. Instant Messaging
    C5. Media Players
    C6. DNS Servers
    C7. Backup Software
    C8. Security, Enterprise, and Directory Management Servers

Network Devices

    N1. VoIP Servers and Phones
    N2. Network and Other Devices Common Configuration Weaknesses

Security Policy and Personnel

    H1. Excessive User Rights and Unauthorized Devices
    H2. Users (Phishing/Spear Phishing)

Special Section

    Z1. Zero Day Attacks and Prevention Strategies

You can read detailed descriptions along with tips for protecting your system from attacks targeting these vulnerabilities at the SANS Web site: http://www.sans.org/top20/.

Also, this month here at Sys Admin we say good-bye to our managing editor, Rikki Kite, who is leaving the publication to pursue a graduate degree and other opportunities. Rikki has been with Sys Admin for almost 7 years and has been a great asset to the magazine because of her fun-loving spirit and creativity as well as her competence and resourcefulness. We wish Rikki success in all things, and we will miss her.

Until we find a new managing editor for the magazine, Hal Pomeranz and I will be handling the author correspondence, so if you have an idea for an article, please send your proposal or manuscript to SAeditors@cmp.com. Currently, we're looking for articles on backup and recovery, clustering, database management, and networking, and we look forward to hearing from you.

Sincerely yours,

Amber Ankerholz
Editor in Chief