Wednesday, August 12, 2015

Security Vulnerability Scanner

Hi All,

Sorry for the delay in posts . Going through a little busy schedule. 

Talking about Vulnerability scanner, these are tools which we can use to find vulnerabilities present in the infrastructure system which may be because of legacy machines or improper implementation of "Information system acquisition and development policy" or rush in completion of projects. 

Those bugs or loops holes can be easily discovered using these kind of vulnerability scanners tools like CCSVM or Qualys Guard but there still some difficulties in use these tools. I am sure you are aware of word called false positive's..

Lengthy reports generated by them some time even required weeks to read it, specially when you are dealing with a huge banking infrastructure of a telecom giant server's. I have used both of them and compare to the licence cost and to manager these commercial tool and complexity in reports i will rather again suggest you Its always been better to develop a proper New system acquisition and development policy in the organisation and implement it with all the new projects being introduces in the organisation it will not just decrease the risk level but also help to save some $ at the end.

For legacy machines you can bring a gateway on change management approval series and makes it mandatory that all changes going to production there infrastructure will be checked for loop holes and vulnerabilities and wont allow implementation of changes till the vulnerabilities are fixed. In case of emergency changes one Security override document ( SOD ) can be asked from the business with a fixed date on it to fix the open bug.

Thursday, April 2, 2015

Security is more important then hacking

Hi Friends i am back but this time we will talk about majorly in the Security of information rather than breaking it.

I will break the security segment based on the security products/ tools available for the security.

Different Administrators and Auditors recommend different tools at different layer in organisation some called it 7 layers of security some all it 4 layer's of security i call it all crap. Layering is nothing just putting hardening the user's permissions and putting more control and monitoring on the user's activities same like a hacker also do with the help of a key-logger. Majority of corporate firms track the internet activities of there employees  for the avoidance of any kind of corporate data leakage and also even for HR related issues like, is the employee is looking for job outside?

There are two ways we actually secure the machines and believe me both are equally important.

1. Using best practices ( secure coding) while designing a software/application or even 3rd party application purchase 
2.  Using available software/application or tools to actually implement the security.

First part we have covered a lot in my precious post's lets talk about security tools and application which are being used t in the world now a days at different level of security.

As we know all 90% of hacking attempts are done by internal staff of the organisation and as we have control on them we put some countermeasures to avoid this. We normally restrict the users rights and the his document control authorization with the help of any DSM  ( document security management tool) . Lets divide the security tools based on below Criteria.

 1. DSM ( Document security tool) :- To avoid any kind of loss of data
2. TSM ( Terminal Security tool ):- To avoid hacking of user account on machines and user activity monitoring / User right's restrictions.
3. User Log monitoring on server.
4. User Internet control
5. SPAM control
6. Session monitoring
7. Common vulnerability Scanning ( Periodic) 
8. Network Security tools
9. Connectivity security etc

I will break them all in following posts.