Security is more important then hacking
Hi Friends i am back but this time we will talk about majorly in the Security of information rather than breaking it.
I will break the security segment based on the security products/ tools available for the security.
Different Administrators and Auditors recommend different tools at different layer in organisation some called it 7 layers of security some all it 4 layer's of security i call it all crap. Layering is nothing just putting hardening the user's permissions and putting more control and monitoring on the user's activities same like a hacker also do with the help of a key-logger. Majority of corporate firms track the internet activities of there employees for the avoidance of any kind of corporate data leakage and also even for HR related issues like, is the employee is looking for job outside?
There are two ways we actually secure the machines and believe me both are equally important.
1. Using best practices ( secure coding) while designing a software/application or even 3rd party application purchase
2. Using available software/application or tools to actually implement the security.
First part we have covered a lot in my precious post's lets talk about security tools and application which are being used t in the world now a days at different level of security.
As we know all 90% of hacking attempts are done by internal staff of the organisation and as we have control on them we put some countermeasures to avoid this. We normally restrict the users rights and the his document control authorization with the help of any DSM ( document security management tool) . Lets divide the security tools based on below Criteria.
1. DSM ( Document security tool) :- To avoid any kind of loss of data
2. TSM ( Terminal Security tool ):- To avoid hacking of user account on machines and user activity monitoring / User right's restrictions.
3. User Log monitoring on server.
4. User Internet control
5. SPAM control
6. Session monitoring
7. Common vulnerability Scanning ( Periodic)
8. Network Security tools
9. Connectivity security etc
I will break them all in following posts.
No comments:
Post a Comment