Security Managers are responsible for planning and monitoring the security operations for any kind of organization or facility. They generate policies that ensure workplace safety and the overall protection of visitors and employees. Ongoing monitoring, loss prevention and managing security technology for on-premise authorizations and or investigations are key elements involved in the security managers responsibilities. Thus, a collaborative work between Security Manager and IT department can help to achieve the common goal of building a Security Infrastructure for your organization.
Role of IT Professionals in ensuring Security of an Organization:
How IT department can help Security Manager in building a Security Infrastructure?
IT department work on various IT security technologies to protect sensitive information from Internal and External threats. These Security Technologies are
Network Security
Endpoint Security
Internet Security
Cloud Security
Application Security
Network Security
To avoid sure illegal incidents, it’s important to detect the weaknesses in the network, which can be achieved using Social Engineering, Vulnerability assessment, Penetration testing, Network Intrusion detection system and Firewalls.
Social Engineering
Vulnerability assessment
Penetration testing
Network intrusion detection systems (NIDS)
Denial of service attacks
Data interception and theft
Identity theft
SQL injection
Other methods of protecting networks include:
IT Security frameworks
Your Subtitle Goes Here
These act like a blueprint for an organization to set up policies and procedures for managing security in an enterprise setting.
Trends in Security Framework Adoption Survey shows 84% of companies in the US leverage a security framework in their company, and 44% use more than one framework.
The most frequently adopted frameworks are:
- PCI DSS (approx 47%)
- ISO 27001/27002 (approx 35%)
- CIS Critical Security Controls (approx 32%)
- NIST Framework for Improving Critical Infrastructure Security (approx 29%)
Password “salt and pepper”
Your Subtitle Goes Here
Adding salt is just like adding random data, to a password makes common passwords unique. Pepper is also a random variable attached to the password, which is helpful in slowing hackers down.
Authorization
Your Subtitle Goes Here
Application whitelisting
Your Subtitle Goes Here
Firewalls
Your Subtitle Goes Here
Honeypots
Your Subtitle Goes Here
Anti-virus software
Your Subtitle Goes Here
Encryption
Your Subtitle Goes Here
Endpoint Security
The Virtual private network (VPN) needs to be protected to prevent a malware or hacker from entering into your system.
Internet Security
Other internet security arsenal includes:
Forms of email security
SSL certificates
WebSocket’s
HTTPS (encrypted transfer protocols)
OAuth 2.0, a leading authorization security technology
Security tokens
Security software suites, anti-malware, and password managers
Encryption, and end-to-end encryption
Cloud Security
It is the act of protecting data from anywhere. Cloud based access control runs on cloud servers, where everything is stored remotely. With all of this connectivity and the flowing of sensitive information comes new concerns with privacy. The data stored in cloud can be vulnerable to attacks. Its important to implement a new sub-domain of security policies: cloud computing security. Optimizing a cloud Security is never an easy task, it involves Computer Network and Information Security. Businesses use public, private or hybrid cloud where data gets exchanged between the two regularly and needs high level of security.
Building a cloud security network involves how all functions will happen in the cloud-like managing access, protecting data, access from everywhere and much more.
Application Security:
A majority of internet-based vulnerabilities come from applications. Security testing (which should be conducted throughout the code’s lifecycle) digs throughout the application code for vulnerabilities and can be automated during your software development lifecycle. Strategies like Ensuring TLS, Authentication and authorization measures, Data encryption, Session handling, Secure API access helps to bolster application security.
“Physical Security Systems are no longer ‘close circuit’ and now play a meaningful role in IT Infrastructure. “
Since Internet-of-Things-based technology has somewhat recent origins, manufacturers do not prioritize connection security when manufacturing the IoT devices. Therefore, the proliferation of the use of functional but vulnerable objects continues to grow over time. The IoT ecosystem such as Sensors (integrated into the devices), Network Connectivity, sensors exchange protocols, Data hosting infrastructure (the Cloud) and UI resulting from the use of insecure interfaces for both the network and the cloud.
The Security challenges we face with IoT security devices are as follows:
Unauthorized access
Your Subtitle Goes Here
Data theft
Your Subtitle Goes Here
The rapid proliferation of threats
Your Subtitle Goes Here
Installing new software on the system requires advanced Security measures
Your Subtitle Goes Here
How IoT devices manage Access Control System, Video Surveillance Systems and Emergency Notification Systems?
Let’s drive in the details of how these devices are connected.
Every IoT device is connected to a management unit, known as a command and control center. These Centers are responsible for software maintenance, configurations, firmware updates to patch bugs and vulnerabilities, and authenticating tasks, such as device enrollment. Whenever there is a specific command to fetch data, these IoT devices connect with the Database directly linked with the Command and Control Center.
Communication between the devices is enabled via application program interface or APIs. Once a device’s manufacturer exposes its API, applications can use it to gather information and communicate with other connected devices. Some of the APIs even allow control over devices.
IoT devices manage Access Control in a facility: A building manager can use an API to remotely lock doors inside a specific office.
IoT device plays a powerful role in providing surveillance solutions in your facility. It controls surveillance devices remotely to monitor all aspects of a facility.
IoT triggers a false alarm in case of any system issue or device functioning failure. Its never limited, there are so many other areas, IoT is involved.
Effective Security Plan in the Age of IoT
IT department with their knowledge on network Security should support a Security manager to protect their organization from such external and internal threats.
Here is an effective plan to ensure the protection of your IoT security devices and system are as follows:
Identify every connected device
Your Subtitle Goes Here
Once you identify the devices, apply a risk-based strategy, prioritizing critical resources in the IoT infrastructure. Examine the resources and protect them according to their value and risk exposure.
List down the functionalities and operations of each device connected over the Bridge
Your Subtitle Goes Here
All these details make the task easier. Because at this point of time you will know what kind of security needs to me provided for what. For Example, you will know you need to use Cloud Security technologies to protect the data on cloud, in case you are using a Cloud based Access Control System.
Conduct a Penetration Test
Your Subtitle Goes Here
Analyze the data
Your Subtitle Goes Here
Use a Data Transport System
Your Subtitle Goes Here
Protect the Cloud interface
Your Subtitle Goes Here
- Change all the default credentials (username and password) during the initial setting.
- Program your system to block any account after 3 to 5 failed login attempts; and
- Ensure that the cloud-based web interface is not susceptible to SQL and HTML Injection or any kind of vulnerabilities.
- Back up your data locally, in case there is any kind of failure.
- Encryption of your cloud data provides an additional layer of security. Cloud services should ensure encryption during the uploading and downloading of data, Advanced Encryption Standard (AES) (256 bits) can help to achieve the goal.
- Encrypt your data before putting into the cloud. Use services that allow passwords and secret key or security question and adopt two-factor authentication that ensures multiple layers of security.
Strong Credentials
Your Subtitle Goes Here
Apply two-step verification for additional safety and block users on failed login attempts.
Protect your System with Anti-Virus & Anti-Spy
Your Subtitle Goes Here
Without proper anti-virus protection for your system, you expose yourself to malware and virus that provide penetration points for hackers to access your system. It is very important to safeguard your system with well-known anti-virus software.