After project leaders pan vulnerability assessment, a Back Orifice demonstration quells the skeptics. My company is about to deploy a virtual private network (VPN). During a recent project meeting, the project manager asked each department representative to identify six tasks related . . .
After project leaders pan vulnerability assessment, a Back Orifice demonstration quells the skeptics. My company is about to deploy a virtual private network (VPN). During a recent project meeting, the project manager asked each department representative to identify six tasks related to our areas of responsibility. To my surprise, my proposal for a security review met with resistance.

Each representative, from corporate communications to training, network engineering, systems administration and so on, read his list. Then I recited my task list. I proposed a vulnerability assessment of the infrastructure, including a review of the configurations relating to the Lightweight Directory Access Protocol (LDAP) server and the VPN gateway. I also recommended an overall review of the architecture.

The link for this article located at ComputerWorld is no longer available.