Translate

Sunday 7 December 2014

INFORMATION SECURITY POLICIES

  • Security policies are the foundation of the security infrastructure.
  • A Security policy is a document or set of documents that describes the security controls that will be implemented in the company at high level

INFORMATION SECURITY POLICIES 2

Structure and Contents of SECURITY POLICIES
Security Policy Structure

INFORMATION SECURITY POLICIES 3

Steps to Create and Implement SECURITY POLICIES

  1. Perform risk assessment to identify the risks to the organization's assets

Friday 5 December 2014

SCOPE & LIMITATIONS OF ETHICAL HACKING

Scope
  • Ethical Hacking is a crucial component of risk assessment, auditing, counterfraud, best practices, and good governance

Wednesday 3 December 2014

TOP INFORMATION SECURITY ATTACK VECTORS

  • Virtualization and Cloud Computing
  • Organized by Cyber Crime
  • Un-patched Software
  • Targeted Malwares
  • Social Engineering
  • Insider Threats
  • Botnets
  • Lack of Cyber Security Professionals
  • Network Application
  • Inadequate Security Policies
  • Mobile Device Security
  • Compliance to Government Laws and Regulation
  • Complexity of Computer Infrastructure
  • Hacktivism

HACKING PHASES

There are five phases in Hacking they are:

Reconnaissance <> Scanning <> Gaining Access <> Maintaining Access <> Clearing Tracks

EFFECTS OF HACKING ON BUSINESS

Compromise Information:
Attackers may steal corporate secrets and sell them to competitors, compromise critical financial information, and leak information to rivals.

Loss of Revenues:

Botnets can be used to launch various types of DoS and other web-based attacks, which may lead to business down-time and significant loss of revenues

Business Loss:

Hacking can be used to steal, pilfer, and redistribute intellectual property leading to business loss

Reputation:

Theft of customers' personal information may risk the business's reputation and invite lawsuits

Statistics:

According to the Symantec 2012 state of information survey, information costs businesses worldwide $1.1 trillion anually

Tuesday 2 December 2014

HACKTIVISM

  • Hacktivism is an act of promoting a political agenda by hacking, especially by defacting or disabling websites

INTRODUCTION TO ETHICAL HACKING

Elements of Information Security:

Confidentiality >> Integrity >> Availability >> Authenticity >> Non-Repudiation