Archive for June 2014
Web Server Security and Database Server Security
Various
high-profile hacking attacks have proven that web security remains the most
critical issue to any business that conducts its operations online. Web servers
are one of the most targeted public faces of an organization, because of the
sensitive data they usually host.
Securing a web server is as important as securing the website or web
application itself and the network around it. If you have a secure web
application and an insecure web server, or vice versa, it still puts your
business at a huge risk. Your company’s security is as strong as its weakest
point.
Although securing a web server can be a daunting
operation and requires specialist expertise, it is not an impossible task. Long hours of research and save you from long nights at the office,
headaches and data breaches in the future.
Irrelevant of what web server software and operating system you are
running, an out of the box configuration is usually insecure. Therefore one must take some necessary steps
in order to increase web server security.
Below is a list of tasks one should follow when securing a web server.
1. Remove Unnecessary
Services
2. Remote access
3. Separate development
/ testing / production environment
4 .Web application
content and server-side scripting
5. Permissions and
privileges
6. Install all security
patches on time
7. Monitor and audit
the server
8. User accounts
9. Remove all unused
modules and application extensions
10. Use security tools
provided with web server software
11. Stay informed
12. Use Scanners
Cyber Crime
Cyber crime encompasses any criminal act dealing with computers and networks (called
hacking). Additionally, cyber crime also includes traditional crimes conducted
through the Internet. For example: hate crimes, telemarketing and Internet
fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are
committed through the use of a computer and the Internet.
Cyber crime is also called computer crime, the use of a computer as an instrument to
further illegal ends, such as committing fraud, trafficking in child
pornography and intellectual property, stealing identities, or violating
privacy. Cyber crime, especially through the Internet, has grown in importance
as the computer has become central to commerce, entertainment, and government.
New
technologies create new criminal opportunities but few new types of crime.
Cybercrime ranges across a spectrum of activities. At one end are crimes that
involve fundamental breaches of personal or corporate privacy, such as assaults
on the integrity of information held in digital depositories and the use of
illegally obtained digital information to blackmail a firm or individual. Also
at this end of the spectrum is the growing crime of identity theft.
At
the other end of the spectrum are those crimes that involve attempts to disrupt
the actual workings of the Internet. These range from spam, hacking, and denial
of service attacks against specific sites.
FIREWALL
Anyone who uses a
computer needs to take computer security very seriously. You rely on your
computer on a daily basis and will want to get the most out of your computer as
possible. This means that you will also want to protect your computer from
danger.
The internet is
basically a large network of computers which are all connected together.
This
makes it very easy for viruses to spread from computer to computer very
quickly. If your computer is connected to the internet then you are at risk and
must install the right security software. One essential piece of security
software is a firewall.
A firewall is a barrier
between you and the internet. There are two main types of firewall: these are
software or hardware firewalls. They filter the traffic from your home network
and the internet. You need to use a firewall whenever you access the internet
because it provides you with invaluable protection.
A firewall separates the
internet from the home network. This splits the network in two which makes it
easy to decide which network traffic you should trust. Computer firewalls will
help to protect you from viruses, DOS (Denial of Service) attacks, hacking and
worms. These threats are always around on the internet and that's why you must
use a firewall to protect you.
A firewall will also
help to protect your identity. Hackers may be able to access your computer and
steal your personal information if you don't already have a firewall in place.
Most firewalls will automatically start separating home and foreign network
traffic. You might need to do some configuration before you can start using
them but most of them will work out of the box with only minor configuration.
Network Security
Network security is a method of preventing your computer
network from the unauthorized user access, email spoofing, Trojan horses,
denial of service, hacking, viruses, spyware and intruders etc. There are
different securities mechanisms are being employed to protect the network. If a
hacker gets control of your computer or network, he can send viruses or steal
your company's confidential data. Similarly if any computer in your network is
infected with the viruses or spyware, all other computers will also be infected
if no proper security system has been implemented. Securing a network is most
important job description of the network administrators, security specialists,
network engineers and IT managers. You can secure your computer network by the
following security methods.
Ethical Hacking
Antimalware
technologies and techniques to the rescue
Not only is modern
malware getting more prevalent and sophisticated, it's also now focusing on a
broader array of targets. Attackers would still love to break into top-level
enterprise systems, but now they're also aiming low, taking advantage of the
fact that each day employees bring their own devices to work and use them to
access corporate networks.
The ability to detect
and respond to advanced malware of all shapes and sizes is now mission-critical
for enterprise information security professionals. InfoSec pros must rethink
their strategies, and assess new technologies and techniques, to thwart high-level
attacks, but they now cannot lose sight of the low-hanging fruit that is the
employee-owned mobile device. This Insider Edition provides fresh thinking and
new information on what antimalware detection and prevention is available to
meet the modern malware threat. To best protect your organization and its
unique assets.
privacy and security
Privacy and Security
For many companies,
collecting sensitive consumer and employee information is an essential part of
doing business. It’s your legal responsibility to take steps to properly secure
or dispose of it. Financial data, personal
information from kids, and material derived from credit reports may raise
additional compliance considerations. In addition, you may have legal
responsibilities to victims of identity theft.
Data Security
server security
A Web server that supports any of the major security
protocols, like SSL, that encrypt and decrypt messages to protect them against
third party tampering. Making purchases from a secure Web server ensures that a
user's payment or personal information can be translated into a secret code
that's difficult to crack. Major security protocols include SSL, SHTTP, PCT,
and IPSec.
MALWARE
Protecting sensitive data is the end goal of almost all IT security measures. Two strong arguments for protecting sensitive data are to avoid identity theft and protect privacy.
The improper disclosure of sensitive data can also cause harm and embarrassment to students, faculty, and staff, and potentially harm the reputation of the Institute. Therefore, it is to everyone's advantage to ensure that sensitive data is protected.