- Security policies are the foundation of the security infrastructure.
- A Security policy is a document or set of documents that describes the security controls that will be implemented in the company at high level
Gun for HACKERS
Translate
Sunday, 7 December 2014
INFORMATION SECURITY POLICIES
INFORMATION SECURITY POLICIES 2
Structure and Contents of SECURITY POLICIES
Security Policy Structure
INFORMATION SECURITY POLICIES 3
Steps to Create and Implement SECURITY POLICIES
- Perform risk assessment to identify the risks to the organization's assets
Friday, 5 December 2014
SCOPE & LIMITATIONS OF ETHICAL HACKING
Scope
- Ethical Hacking is a crucial component of risk assessment, auditing, counterfraud, best practices, and good governance
Thursday, 4 December 2014
SKILLS OF AN ETHICAL HACKER
- Platform Knowledge
Has in-depth knowledge of major operating environments, such as Windows, Unix, and Linux
Wednesday, 3 December 2014
TOP INFORMATION SECURITY ATTACK VECTORS
- Virtualization and Cloud Computing
- Organized by Cyber Crime
- Un-patched Software
- Targeted Malwares
- Social Engineering
- Insider Threats
- Botnets
- Lack of Cyber Security Professionals
- Network Application
- Inadequate Security Policies
- Mobile Device Security
- Compliance to Government Laws and Regulation
- Complexity of Computer Infrastructure
- Hacktivism
HACKING PHASES
There are five phases in Hacking they are:
Reconnaissance <> Scanning <> Gaining Access <> Maintaining Access <> Clearing Tracks
Reconnaissance <> Scanning <> Gaining Access <> Maintaining Access <> Clearing Tracks
EFFECTS OF HACKING ON BUSINESS
Compromise Information:
Attackers may steal corporate secrets and sell them to competitors, compromise critical financial information, and leak information to rivals.
Loss of Revenues:
Botnets can be used to launch various types of DoS and other web-based attacks, which may lead to business down-time and significant loss of revenues
Business Loss:
Hacking can be used to steal, pilfer, and redistribute intellectual property leading to business loss
Reputation:
Theft of customers' personal information may risk the business's reputation and invite lawsuits
Statistics:
According to the Symantec 2012 state of information survey, information costs businesses worldwide $1.1 trillion anually
Tuesday, 2 December 2014
HACKTIVISM
- Hacktivism is an act of promoting a political agenda by hacking, especially by defacting or disabling websites
INTRODUCTION TO ETHICAL HACKING
Elements of Information Security:
Confidentiality >> Integrity >> Availability >> Authenticity >> Non-Repudiation
Subscribe to:
Posts (Atom)