Entradas

Mostrando las entradas de octubre, 2018

Unintentional Security Issues and Malware

There're a great deal of accidental security issues but i'm focusing on how the human factor intercedes with data security and integrity. Up to 28% of Enterprise Data Security Incidents Come from Inside While hackers are growing more and more sophisticated, much of the threat of organizations actually comes from inside. That isn’t to say that any of the employees has malicious intent, though it’s possible, but they may be poorly trained, or the enterprise data security policies may be poorly enforced. All of these leading to Unintentional Security Issues. 32% of companies surveyed said that insider events were “more costly or damaging” than similar attacks coming from the outside. But in order to toughen up your security stance and protect yourself from the enemy within, it’s important to know how your employees may be compromising your digital security. 2014 was a rough year for enterprise data security, if the high profile breaches of Sony, JPMorgan an

Operating System Security (Linux Focus)

The process of ensuring OS integrity, confidentiality and availability "OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions. OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised" (Technopedia, 2018) Why is is Linux is the most secure operating system? Linux has the potential to be the most secure OS if the users is experienced or acquainted with security protocols, terms and technology. Even though Linux is open source people might think that it's the least secure OS, but in fact it's an important reason why Linux is so secure because Anyone can review code and make sure there are no bugs or back doors. Linux is reviewed by the tech community, which lends itself to security: "By having that much oversight, there are fewer vulnerabilities, bugs a

Data Integrity and Management

Imagen
Data integrity has become a serious issue over the past few years and therefore is a core focus of many enterprises. What is Data Integrity? "Data integrity refers to the fact that data must be reliable and accurate over its entire lifecycle " (Finestone, 2018), meaning that the data lifecycle provides a high level overview of the stages involved in successful management and preservation of data for use and reuse. Data integrity and data security go hand in hand, even though they’re separate concepts. Uncorrupted data (integrity) is considered to be whole and then stay unchanged relative to that complete state. Maintaining or keeping data consistent throughout its lifecycle is a matter of protecting it (security) so that it’s reliable. And data that’s reliable is simply able to meet certain standards, with which compliance is necessary. Data is expected to be (Finestone, 2018): Attributable - Data should clearly demonstrate who observed and recorded it, wh

Authentication, Access Control and Security Policies

Imagen
Authentication, Access Control and Security Policies , these three concepts define modern-day protection in the world of technology. But first let's define each one of them. What is Authentication ? "The process of determining whether someone or something is, in fact, who or what it declares itself to be" (Rosencrance, 2018). How authentication is used: Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server. Generally, a user has to choose a username or user ID and provide a valid password to begin using a system. User authentication authorizes human-to-machine interactions in operating systems and applications, as well as both wired and wireless networks to enable access to networked and internet-connected systems, applications and resources. Authentication factors: Knowledge factor: "Something you kno