Originally Posted By: OVERK1LL
This is really a failing of systems. None of these computers should have had Internet Access directly in the first place. For the Windows boxes a WSUS box with multiple interfaces that sees the outside world for downloading of updates, then another interface that speaks to the physical LAN to provide those updates to clients is a pretty "basic" method to provide updates while preventing the clients access to the resources outside their LAN. For remote monitoring, the connections should all be dedicated links as Garak touched on.
Quite right. I speak from former professional experience. For certain federal government computers, only certain people were allowed to do upgrades (as Mystic mentioned for his organization). I was one of the two people in this province authorized to perform upgrades. I dealt extensively with Network Associates at the time to customize installations, upgrades, and security on the dedicated link network.
Basically, upgrades of whatever software had to come from the clear net somewhere, or shipped on CD or DVD. They were then checked by other security people and myself. Then I posted the update on the dedicated network. Prior to that, I had to go to each computer and point them in the right direction to grab the updates.
That's where part of my hatred for commercial software and Windows stems. Many people in the field have no comprehension as to how dedicated networks work, their topography, what speed limitations might be encountered, and so forth. The people at Network Associates had no concept and I had to devise an update protocol from the ground up. Then, there are always other pieces of software that try to update themselves, find no internet connection, and then puke all over themselves.
It does make a much more secure system. Even if software is infected, the only thing it can actually do is damage data. It can't send data to the wrong hands, since there is no connection to the outside internet world, and no modem connection for phantom dialers.
For any country trying to protect secrets, allowing highly classified information on any computer connected to the internet or having mission critical computers connected to the internet is the peak of bungling.
Even encryption doesn't cut it in such a case, if it's still connected to the internet. The weak link is someone decrypting things and sending them where they don't belong. If there is no connection to the internet, the data security can be protected by physical searches for USB drives and other media upon entry to and exit from the facility.