IndianSaint
Associate Head Coach
Posts: 8,974
Dislikes:
|
Post by IndianSaint on May 14, 2021 10:13:46 GMT -5
Maybe some more technologically minded people can help me out here but what I don’t understand is why are so many “mission critical” systems/servers ARE connected to less secure ones or connected to the internet?
I guess what I’m trying to say is why allow “access” to them from outside systems/servers? I get it allows the users access from their home computers through portals but when will we learn that if no one had access outside the people physically in the building then wouldn’t that be safer from these attacks?
Then the only way to attack them would be to infiltrate the physical building which should have its own separate security.
Almost like if I had a separate computer, not connected to the internet, then no one could gain access unless they got into my house.
|
|
indian82
Assistant Coach
Posts: 6,450
Dislikes:
|
Post by indian82 on May 16, 2021 7:13:07 GMT -5
Maybe some more technologically minded people can help me out here but what I don’t understand is why are so many “mission critical” systems/servers ARE connected to less secure ones or connected to the internet? I guess what I’m trying to say is why allow “access” to them from outside systems/servers? I get it allows the users access from their home computers through portals but when will we learn that if no one had access outside the people physically in the building then wouldn’t that be safer from these attacks? Then the only way to attack them would be to infiltrate the physical building which should have its own separate security. Almost like if I had a separate computer, not connected to the internet, then no one could gain access unless they got into my house. That's a really good question. Not sure if it's possible (or feasible) these days to have a network entirely encapsulated and impossible for access from some point outside. I'm just not sure. Also, believe it or not but I heard that access through this may have been via an email that was opened that had some kind of attachment (however disguised). If that's the case, that's even more unacceptable. It seems that email systems for highly sensitive applications should be on a TOTALLY separate network with ZERO access to the main system. But again, I don't know anywhere near enough about networking to really judge.
|
|