The NSA’s lead hacker and head of Tailored Access Operations (TAO), Rob Joyce, recently gave a rare speech on the stops and starts of covert network intrusion. In it, he informed organizations how to protect themselves from the NSA. His security tips, he admits, seem almost mundane—segmenting networks, limiting access to sensitive data, and knowing what is actually running on your network—but they are the bulwarks against intrusion. What really caught my eye, however, was this:
“Another nightmare for the NSA? An ‘out-of-band network tap’—a device that monitors network activity and produces logs that can record anomalous activity—plus a smart system administrator who actually reads the logs and pays attention to what they say.”
A nightmare for the NSA is also a nightmare for hackers, and subsequently a dream come true for security professionals, but what does it really mean to have an “out-of-band network tap” and a “smart sys admin”?
Putting Joyce’s recommendations into practice to secure your network from prying eyes, no matter the direction, isn’t hard, but it does require some persistence.
Please read the full article at: http://www.cybersecuritytrend.com/topics/cyber-security/articles/422105-deeper-look-into-nsas-talk-network-taps-smart.htm