Role of IT Professionals in ensuring Security of an Organization:
How IT department can help Security Manager in building a Security Infrastructure?
Network Security
Endpoint Security
Internet Security
Cloud Security
Application Security
Network Security
Social Engineering
Vulnerability assessment
Penetration testing
Network intrusion detection systems (NIDS)
Denial of service attacks
Data interception and theft
Identity theft
SQL injection
Other methods of protecting networks include:
These act like a blueprint for an organization to set up policies and procedures for managing security in an enterprise setting.
Trends in Security Framework Adoption Survey shows 84% of companies in the US leverage a security framework in their company, and 44% use more than one framework.
The most frequently adopted frameworks are:
- PCI DSS (approx 47%)
- ISO 27001/27002 (approx 35%)
- CIS Critical Security Controls (approx 32%)
- NIST Framework for Improving Critical Infrastructure Security (approx 29%)
Adding salt is just like adding random data, to a password makes common passwords unique. Pepper is also a random variable attached to the password, which is helpful in slowing hackers down.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions _builder_version=”4.16″ global_colors_info=”{}”][chiac_divi_accordions_item title=”Authorization” chiac_subtitle_state=”off” chiac_header_margin=”|23px||23px|false|false” chiac_title_bg_color=”#ffffff” chiac_title_bg_color_o=”#05a9e2″ chiac_title_margin=”||||false|false” chiac_title_padding=”|20px|8px|20px|false|false” chiac_select_fonticon=”1||divi||400″ chiac_l_icon_size=”23px” chiac_l_icon_color=”#05a9e2″ chiac_l_icon_color_o=”#000000″ chiac_r_icon_rotate=”on” chiac_select_r_fonticon=”||divi||400″ chiac_r_icon_size=”23px” chiac_r_icon_color=”#000000″ chiac_r_icon_color_o=”#05a9e2″ _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_align=”left” global_colors_info=”{}”]Authorization, authentication, and two-factor authentication can help to provide additional security. [/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions _builder_version=”4.16″ global_colors_info=”{}”][chiac_divi_accordions_item title=”Application whitelisting ” chiac_subtitle_state=”off” chiac_header_margin=”|23px||23px|false|false” chiac_title_bg_color=”#ffffff” chiac_title_bg_color_o=”#05a9e2″ chiac_title_margin=”||||false|false” chiac_title_padding=”|20px|8px|20px|false|false” chiac_select_fonticon=”1||divi||400″ chiac_l_icon_size=”23px” chiac_l_icon_color=”#05a9e2″ chiac_l_icon_color_o=”#000000″ chiac_r_icon_rotate=”on” chiac_select_r_fonticon=”||divi||400″ chiac_r_icon_size=”23px” chiac_r_icon_color=”#000000″ chiac_r_icon_color_o=”#05a9e2″ _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_align=”left” global_colors_info=”{}”]It prevents unauthorized apps from running on a system. [/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions _builder_version=”4.16″ global_colors_info=”{}”][chiac_divi_accordions_item title=”Firewalls” chiac_subtitle_state=”off” chiac_header_margin=”|23px||23px|false|false” chiac_title_bg_color=”#ffffff” chiac_title_bg_color_o=”#05a9e2″ chiac_title_margin=”||||false|false” chiac_title_padding=”|20px|8px|20px|false|false” chiac_select_fonticon=”1||divi||400″ chiac_l_icon_size=”23px” chiac_l_icon_color=”#05a9e2″ chiac_l_icon_color_o=”#000000″ chiac_r_icon_rotate=”on” chiac_select_r_fonticon=”||divi||400″ chiac_r_icon_size=”23px” chiac_r_icon_color=”#000000″ chiac_r_icon_color_o=”#05a9e2″ _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_align=”left” global_colors_info=”{}”]Block unauthorized access to a network. [/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions _builder_version=”4.16″ global_colors_info=”{}”][chiac_divi_accordions_item title=”Honeypots” chiac_subtitle_state=”off” chiac_header_margin=”|23px||23px|false|false” chiac_title_bg_color=”#ffffff” chiac_title_bg_color_o=”#05a9e2″ chiac_title_margin=”||||false|false” chiac_title_padding=”|20px|8px|20px|false|false” chiac_select_fonticon=”1||divi||400″ chiac_l_icon_size=”23px” chiac_l_icon_color=”#05a9e2″ chiac_l_icon_color_o=”#000000″ chiac_r_icon_rotate=”on” chiac_select_r_fonticon=”||divi||400″ chiac_r_icon_size=”23px” chiac_r_icon_color=”#000000″ chiac_r_icon_color_o=”#05a9e2″ _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_align=”left” global_colors_info=”{}”]These are mechanism set to detect and counteract attempts at unauthorized use of information systems. [/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions _builder_version=”4.16″ global_colors_info=”{}”][chiac_divi_accordions_item title=”Anti-virus software” chiac_subtitle_state=”off” chiac_header_margin=”|23px||23px|false|false” chiac_title_bg_color=”#ffffff” chiac_title_bg_color_o=”#05a9e2″ chiac_title_margin=”||||false|false” chiac_title_padding=”|20px|8px|20px|false|false” chiac_select_fonticon=”1||divi||400″ chiac_l_icon_size=”23px” chiac_l_icon_color=”#05a9e2″ chiac_l_icon_color_o=”#000000″ chiac_r_icon_rotate=”on” chiac_select_r_fonticon=”||divi||400″ chiac_r_icon_size=”23px” chiac_r_icon_color=”#000000″ chiac_r_icon_color_o=”#05a9e2″ _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_align=”left” global_colors_info=”{}”]These software’s prevent computer virus. [/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions _builder_version=”4.16″ global_colors_info=”{}”][chiac_divi_accordions_item title=”Encryption” chiac_subtitle_state=”off” chiac_header_margin=”|23px||23px|false|false” chiac_title_bg_color=”#ffffff” chiac_title_bg_color_o=”#05a9e2″ chiac_title_margin=”||||false|false” chiac_title_padding=”|20px|8px|20px|false|false” chiac_select_fonticon=”1||divi||400″ chiac_l_icon_size=”23px” chiac_l_icon_color=”#05a9e2″ chiac_l_icon_color_o=”#000000″ chiac_r_icon_rotate=”on” chiac_select_r_fonticon=”||divi||400″ chiac_r_icon_size=”23px” chiac_r_icon_color=”#000000″ chiac_r_icon_color_o=”#05a9e2″ _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_align=”left” global_colors_info=”{}”]Decoding data, end-to-end encryption often used in messaging apps and platforms that only allows encrypted messages to be read by sender and receiver. [/chiac_divi_accordions_item][/chiac_divi_accordions]Endpoint Security
Internet Security
Other internet security arsenal includes:
Forms of email security
SSL certificates
WebSocket’s
HTTPS (encrypted transfer protocols)
OAuth 2.0, a leading authorization security technology
Security tokens
Security software suites, anti-malware, and password managers
Encryption, and end-to-end encryption
Cloud Security
It is the act of protecting data from anywhere. Cloud based access control runs on cloud servers, where everything is stored remotely. With all of this connectivity and the flowing of sensitive information comes new concerns with privacy. The data stored in cloud can be vulnerable to attacks. Its important to implement a new sub-domain of security policies: cloud computing security. Optimizing a cloud Security is never an easy task, it involves Computer Network and Information Security. Businesses use public, private or hybrid cloud where data gets exchanged between the two regularly and needs high level of security.
Building a cloud security network involves how all functions will happen in the cloud-like managing access, protecting data, access from everywhere and much more.
Application Security:
A majority of internet-based vulnerabilities come from applications. Security testing (which should be conducted throughout the code’s lifecycle) digs throughout the application code for vulnerabilities and can be automated during your software development lifecycle. Strategies like Ensuring TLS, Authentication and authorization measures, Data encryption, Session handling, Secure API access helps to bolster application security.
“Physical Security Systems are no longer ‘close circuit’ and now play a meaningful role in IT Infrastructure. “
The Security challenges we face with IoT security devices are as follows:
How IoT devices manage Access Control System, Video Surveillance Systems and Emergency Notification Systems?
Effective Security Plan in the Age of IoT
IT department with their knowledge on network Security should support a Security manager to protect their organization from such external and internal threats.
Here is an effective plan to ensure the protection of your IoT security devices and system are as follows:
- Change all the default credentials (username and password) during the initial setting.
- Program your system to block any account after 3 to 5 failed login attempts; and
- Ensure that the cloud-based web interface is not susceptible to SQL and HTML Injection or any kind of vulnerabilities.
- Back up your data locally, in case there is any kind of failure.
- Encryption of your cloud data provides an additional layer of security. Cloud services should ensure encryption during the uploading and downloading of data, Advanced Encryption Standard (AES) (256 bits) can help to achieve the goal.
- Encrypt your data before putting into the cloud. Use services that allow passwords and secret key or security question and adopt two-factor authentication that ensures multiple layers of security.
Without proper anti-virus protection for your system, you expose yourself to malware and virus that provide penetration points for hackers to access your system. It is very important to safeguard your system with well-known anti-virus software.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions _builder_version=”4.16″ global_colors_info=”{}”][chiac_divi_accordions_item title=”Respond to Incidents” chiac_subtitle_state=”off” chiac_header_margin=”|23px||23px|false|false” chiac_title_bg_color=”#ffffff” chiac_title_bg_color_o=”#05a9e2″ chiac_title_margin=”||||false|false” chiac_title_padding=”|20px|8px|20px|false|false” chiac_select_fonticon=”1||divi||400″ chiac_l_icon_size=”23px” chiac_l_icon_color=”#05a9e2″ chiac_l_icon_color_o=”#000000″ chiac_r_icon_rotate=”on” chiac_select_r_fonticon=”;||divi||400″ chiac_r_icon_size=”23px” chiac_r_icon_color=”#000000″ chiac_r_icon_color_o=”#05a9e2″ _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_align=”left” global_colors_info=”{}”]Quick troubleshooting tool can help to track issues in a virtual environment that improves your workflow. [/chiac_divi_accordions_item][/chiac_divi_accordions]