Security breaches


Organizational security procedures
-          - Access control for physical entry
-         -  Computer based access control
-         -  Visitor notifications
-         -  System logs
-        -   System auto lock policy user permissions
-        -   Starter and leaver
-       -    Clear desk policy and documentation handling
- Does knowing popular security breaches beneficial for an organization?

Security breaches
-          Happen when someone access without permission
-          When confidential information is exposed

Types of security breaches

1.       Denial of service
-          When a website is overwhelmed with requests, which blocks other users from the site

2.       Malware
-          Example of malware is adware, viruses, Trojans, crime ware, spyware, worms

Malware symptoms
-          System slow down
-          Annoying ads and pop up messages
-          Browser homepage keeps changing
-          Unexpected error messages
-          Antivirus gets disabled automatically

3.       Ransom ware
-          Hacker gains control of the company system and locks it from use
-          A ransom ware note is left within the virus
-          The company or user is extorted to pay money

4.       Password attacks
-          A combination of brute force attacks that are used to gain access to insecure passwords

5.       Phishing
-          Email or phone calls that seem official to gain access or personal information is called phishing
-          They frequently take the guise of known, credible entities – such as a person’s bank

How to prevent security breaches?

-          Regularly back up files
-          Keep systems and applications updated
-          Enforce the principle of least privilege
-          Secure email gateways Example firewall
-          Implement defense in depth
-          Foster a culture of security in the workplace






Comments

Popular posts from this blog

Log Review

Organizational security types

Network planning - Proof of concept