When the tides of life turn against you... And the current upsets your boat... Don't waste those tears on what might have been... Just lay on your back and float!...

Showing posts with label education. Show all posts
Showing posts with label education. Show all posts

Network Security – The Real Vulnerabilities

Scenario: You work in a corporate environment in which you are, at least partially, responsible for network security. You have implemented a firewall, virus and spyware protection, and your computers are all up to date with patches and security fixes. You sit there and think about the lovely job you have done to make sure that you will not be hacked.


 


You have done, what most people think, are the major steps towards a secure network. This is partially correct. What about the other factors?

Have you thought about a social engineering attack? What about the users who use your network on a daily basis? Are you prepared in dealing with attacks by these people?

Believe it or not, the weakest link in your security plan is the people who use your network. For the most part, users are uneducated on the procedures to identify and neutralize a social engineering attack. What’s going to stop a user from finding a CD or DVD in the lunch room and taking it to their workstation and opening the files? This disk could contain a spreadsheet or word processor document that has a malicious macro embedded in it. The next thing you know, your network is compromised.

This problem exists particularly in an environment where a help desk staff reset passwords over the phone. There is nothing to stop a person intent on breaking into your network from calling the help desk, pretending to be an employee, and asking to have a password reset. Most organizations use a system to generate usernames, so it is not very difficult to figure them out.
 
Your organization should have strict policies in place to verify the identity of a user before a password reset can be done. One simple thing to do is to have the user go to the help desk in person. The other method, which works well if your offices are geographically far away, is to designate one contact in the office who can phone for a password reset. This way everyone who works on the help desk can recognize the voice of this person and know that he or she is who they say they are.

Why would an attacker go to your office or make a phone call to the help desk? Simple, it is usually the path of least resistance. There is no need to spend hours trying to break into an electronic system when the physical system is easier to exploit. The next time you see someone walk through the door behind you, and do not recognize them, stop and ask who they are and what they are there for. If you do this, and it happens to be someone who is not supposed to be there, most of the time he will get out as fast as possible. If the person is supposed to be there then he will most likely be able to produce the name of the person he is there to see.

I know you are saying that I am crazy, right? Well think of Kevin Mitnick. He is one of the most decorated hackers of all time. The US government thought he could whistle tones into a telephone and launch a nuclear attack. Most of his hacking was done through social engineering. Whether he did it through physical visits to offices or by making a phone call, he accomplished some of the greatest hacks to date. If you want to know more about him Google his name or read the two books he has written.
 
It’s beyond me why people try and dismiss these types of attacks. I guess some network engineers are just too proud of their network to admit that they could be breached so easily. Or is it the fact that people don’t feel they should be responsible for educating their employees? Most organizations don’t give their IT departments the jurisdiction to promote physical security. This is usually a problem for the building manager or facilities management. None the less, if you can educate your employees the slightest bit; you may be able to prevent a network breach from a physical or social engineering attack.
 

Read More......

Introduction

Assalamualaikum w.b.t.

Huhuhu.. First class kiteorg encek just introduce diri dia.. tp before tue kn encek tetiber jer terus bg kuiz kat kami semue.. tekejut gak xtau ape2 dia nk bg kuiz... so kau memakser ku terpakser ler jwbnyer... kuiz dia nie byk menguji IQ kiter gak la... ader la beberapa soklan pasal IT secure la.... quite ok gak la.. tp aku der salah gakk.. huhuhuu..

Ermmm... okay! name encek, En. Mohd Zaki Bin Mas’ud yg telah mndpt pendidikan dlm B. Eng (Hons) Electronic (MMU), MIT(SC) (UKM) . Encek kater kalu nk contact dia kt no nie, 06 233 3146 or email ajer kt
zaki.masud@utem.edu.my. Then, encek ckp kalu nk juper dia consultation hour adlh Wednesday, 14:00-17:00.. tue time dia betul2 free la... kan encek? time laen tue jenguk2 la dia di bilik dia.. bak kater encek!..

Encek explain kt kiteorg aper lesson planning, assessment, schedule for lecture and lab session, and references/ text book yg gune utk subjek Network & IT Security nie.. Then encek ader gak tanyer kiteorg Why Study Computer Security? huhuhuhu... kenaper yer? errrkkk... for me la... computer security nie penting la coz untuk secure kiter punyer kejer2 cthnyer kiter create password supaya xder org yg senang2 nk attack kejer kiter. Ermm... computer security jugak utk free from virus yg mmg selalunya mudah sgt membiak dlm kiter punyer PC... iskk betul ker ha? errrkkk....

Okay! for lesson plan kiteorg will be covered 12 lectures : -

  • Introduction to Information Security
  • Authentication and Basic Cryptography
  • Program Security
  • Operating System Security
  • Database Security
  • Security in Networks
  • Security in Applications
  • Wireless Security
  • Legal and Ethical Issues in Computer Security
  • Cyberlaws
  • Administering Security
  • Designing, Implementing and Maintaining the Recovery Solution
For the assessment : -
  • Quiz (x4) & Assignment (x2) - 20%
  • Lab Report (x4) - 10%
  • Lab Exam (x1) – 5 %
  • Seminar (x1) – 5 %
  • Mid Term Exam - 20%
  • Project - 10%
  • Final Exam - 30%
Hope i will get da best result.. amin... :)
References / Text Book that common use in Network and IT Security : -
  • Text Book
    ~ Information Technology Security
    ~Author: Siti Rahayu, Robiah, Mohd Faizal and Nazrulazhar
    ~Pearson, 2006
  • References
    ~C.P. Pfleeger, S. L. Pfleeger (2003). Security in computing 3rd Ed., Prentice Hall International, Inc., ISBN 0-13-035548-8.
    ~Gregor Neaga, Bruce Qinters and Pat Laufman (1997). Fire in the computer Room, What Now?, Prentice Hall Ptr, ISBN: 0137543913.
    ~Paul Cretaro (2005), Lab Manual for Security+ - Guide to Network Security Fundamentals, Thomson Course Technology, ISBN 0-619-21536-4.
Nie encek explain kt kiteorg Why Study Computer Security nie.. hmm...
  1. An information security specialist is more than a technician who prevents hackers from attacking a Web site. ( nie kire nk mencegah hackers drpd attack sesuatu website ler..)
  2. BUT, need to understand about cryptography and firewall which these tools used by specialists to protect information systems. ( huhuhuuu.. kene faham la cryptography & firewall nie yg digunakan untuk melindungi sistem-sistem maklumat)
  3. Growing IT security importance and new career opportunities
  4. Increasing demand by government and private industry
" Knowing others is intelligence , knowing yourself is true wisdom."
Alhamdulillah...


Read More......

blur!!... (",)

encek...!!!... nnt yer sayer tuliss blogg nie!!.. sy dop sempat lg la encekk.... sebabnyer... sy masih kebluraannn lg ngn keadaann di kampus baru ni.. ngn kater lain kehidupan di building br "ftmk" yg baru ini... asyikk dop juper cari kelas jer la encekk!!... tiap2 ari duk men musing2 nk msk kelas... adess... tensen!!... :((

Read More......
Related Posts with Thumbnails