Skip to main content

Security Issues in 2017

Cybercriminals are improving the techniques to attack on online systems and you need to keep the pace with them. They are adapting to the improvements in cyber security and creating evolving techniques to bypass the security mechanism. To keep your system secure you also need to adapt to new threats and protect your customers’ data from being compromised. We have collected a list of tasks that need to be done to stay secure and keep your system secure as well. The list is by no means complete but priority should be given to these tasks as they are fundamental things for protection against threats.

Identity and access management:

Identity and access management is critical to any cyber security practice.  It includes recording the information regarding the users of the system.  It further consists of authentication of the users and their rights of performing manipulation of records inside a system. You need to know – and keep track of – who is using your network and what he is up to. Identity and access management further includes verification of the users, allotment of proper authorization levels and solidification of identity.

Virtualization Security:

Physical security devices are meant to shield physical or on-premise infrastructures against threats.  As the use of virtualized environments is growing, we need to adapt to a different way of security for them. Virtualization security is one such thing. It basically includes collective measures, strategies and methods that ensure the security of a virtualization infrastructure. It is like wrapping every software and device in a rather secured container. One can guard his information from anywhere and construct tailor-made policies for software

Cryptography:

Cryptography is all about securing communication between two parties from any unauthorized party. It includes encrypting information with the help of a key on which both parties agreed upon. The sender of the information encrypts his message and generates a key based on which the message could be decrypted. It then sends the message to the receiver which decrypts it using key. Cryptography is used in many applications over the internet including Secure Socket Layer (SSL) which is used to protect against the man-in-the-middle. You need to have SSL certificate for your website so that the information of your customers is not sacrificed.

This is kind of a to-do list for your system’s security and protection. By following and implementing the things that we discussed would result in a more secure system.

Comments

Popular posts from this blog

HCI: Research Topic Ideas

I was reading an interesting research paper (Personal Tasks at Work: An Exploration, ACM 2017) in which the writer talks about the personal tasks that we have to do at work such as scheduling appointments, paying electricity and other bills, etc. The problem at first seems to be a social science one which has nothing to do with computer science but when looked closely the problem highlights an important aspect of our daily life that has to be sorted out using technology. The paper basically discusses those tasks and categorizes them based on frequency of occurring based on a survey. So, for example out of the 93 people who participated in the survey presented in the paper, 51% reported a need for scheduling an appointment while 33% have to coordinate their personal activities. Some will say (specially management science guys) that few of the problems can be solved by proper time management but remember that the purpose of technology is to make life easier for humans. Also, not every …

Simplified DES Example: Step by Step

Simplified DES or S-DES is an encryption algorithm which follows feistal cipher structure. In this tutorial, we will take an example of S-DES. Let’s get started.
We need plaintext and key to start with. For this example, let’s consider 01001000 be the 8-bit plaintext and 1110001110 be the 10-bit key.
Key Generation: The first step in S-DES process is key generation. From the 10-bit key that we give as input, it generates 2 1-bit keys called k1 and k2. Following is the process:
1.Pass the 10-bit input key into the P10 table:
3 5 2 7 4 10 1 9 8 6
This gives: 1011001110. (For example, take the 3rd bit from input key which is 1. It becomes the first bit for our new key) 2.Divide the new key into two halves and left shift each half’s bits by one. So by dividing we get 10110 and 01110. We perform left shift so the left most bit becomes the right most bit and remaining each bit is shifted to its left. This gives: 01101 and 11100. Or you can think of it as the left most bit is taken to the righ…

Cyber Security Awareness: for Employees

The insecurity of data and information that exists on the internet and computer networks has been a major issue for a number of businesses, organizations, and institutions; which don't invest on network and internet security training and awareness programs for their employees. Ideally, most employers rush to invest in new and expensive technologies in the name of protecting their companies online, not knowing that in most cases, the safety of a company online largely depends on the cyber security awareness of the employees. Consequently, your company's protection online starts by ensuring that your employees are well equipped with basic network safety practices and policies, so that they can assist in keeping your computers and networks safe from cyber-attacks that come in form of a virus, malware, and cyber-crime.

Different Ways to Create Cyber Security Awareness to Your Employees:
1.Authentication
The most basic network security measure that your employees need to use is a pass…