Forum all new and wonderful
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Search
 
 

Display results as :
 


Rechercher Advanced Search

Keywords

Latest topics
» Kerala’s famous Ayurveda treatments
Managing Risk in IT Security For Mid-Sized Organizations   by JNN HUN EmptyWed Nov 05, 2014 6:06 am by ilsaim

» Cure for rheumatoid Arthritis
Managing Risk in IT Security For Mid-Sized Organizations   by JNN HUN EmptyMon Dec 09, 2013 6:23 am by qerlindamin

» aspects to ponder upon when registering for yoga training
Managing Risk in IT Security For Mid-Sized Organizations   by JNN HUN EmptySat Nov 23, 2013 5:55 am by liyonna

» View the match Singapore, Jordan, 10/11/2011 online
Managing Risk in IT Security For Mid-Sized Organizations   by JNN HUN EmptySun Oct 09, 2011 11:19 pm by Admin

» View the match against Singapore vs Jordan, 10/11/2011 online
Managing Risk in IT Security For Mid-Sized Organizations   by JNN HUN EmptySun Oct 09, 2011 10:50 pm by Admin

» View the match against Singapore, Jordan, 10/11/2011 online
Managing Risk in IT Security For Mid-Sized Organizations   by JNN HUN EmptySun Oct 09, 2011 10:49 pm by Admin

» China vs Singapore - All Goals & Match Highlights (02 Sep 2011) 2014 FIFA World Cup Qualifier
Managing Risk in IT Security For Mid-Sized Organizations   by JNN HUN EmptySun Oct 09, 2011 10:43 pm by Admin

» Very funny cats pictures and beautiful, cats, funny, beautiful, wonderful, fascinating mind
Managing Risk in IT Security For Mid-Sized Organizations   by JNN HUN EmptyFri Sep 30, 2011 11:43 pm by Admin

» Solar Panel Installation - A Career With A Bright Future
Managing Risk in IT Security For Mid-Sized Organizations   by JNN HUN EmptyFri Sep 30, 2011 10:47 pm by Admin

May 2024
MonTueWedThuFriSatSun
  12345
6789101112
13141516171819
20212223242526
2728293031  

Calendar Calendar


Managing Risk in IT Security For Mid-Sized Organizations by JNN HUN

Go down

Managing Risk in IT Security For Mid-Sized Organizations   by JNN HUN Empty Managing Risk in IT Security For Mid-Sized Organizations by JNN HUN

Post  Admin Thu Jul 07, 2011 10:44 pm

Get all your IT security questions answered by James Randell in a comprehensive interview.

I have implemented firewalls and anti-virus, are these the key security tools I have to have?

Absolutely firewall and anti virus tools are extremely necessary for organization organisations, but we need to be clear about what they really do. Firewalls are primarily a network access control technologies. This is an imperative function in today's networks, its particularly vital that you ought to set restrictions on who should really access your network but its just as very important that you appear at the content of the 'envelope'.

Antivirus tools are also particularly valuable for organisations, they assist them in defending there servers and desktops against attack by malicious software like viruses, Trojans and worms, and so on. As lengthy as you're clear about what the tools do, they are necessary, but not each organisations security challenges are going to be solved by managing network access control and defending against malicious software program, so an organisation definitely wants to take a risk based approach at searching at what security tools they need.

What precisely is security anyway?

This is really quite straightforward but still it confuses a lot of many people. Security is about managing risk to your small business. Risk could possibly have an effect on your ongoing profitability, your revenues or it may possibly impact your organizational climate. The idea is to manage, control and assess those risks.

What are some of the key security problems faced by firms nowadays?

This can vary quite a bit depending on the organisation and what kind of on the net presence they sustain, but some of the principal problems are issues like remote network base attacks. There are also legal compliance problems - complying with business distinct regulatory frameworks are also a concern for organisations. The miss appropriation of confidential information or propriety facts such as trade secrets and designs are also a significant consideration for organisations.

It is exceptionally tough to get straight answers about exactly what I require to do to comply with an industry-particular regulation?

Part of the challenge here is that compliance framework and compliance requirements can commonly be given scary names. The thing to keep in mind about these, is that when you look at all the numerous regulatory and compliance frameworks, most of them share so significantly common ground. Supplying you are approaching your security policies and processes and tool deployments from a best practice and common sense point of view, you're essentially likely to be complying with the greater part of nearly all compliance frame works. There are some specific business variations though which you do will need to be conscious of, but they are mostly all about preferred practice and nothing to be too scared of.

Why do vendors maintain attempting to scare me into obtaining security merchandise?

Its good that the tools are working and that absolutely nothing bad has happened but it is still especially significant to keep security tools up to date. Attackers are continually researching new methods and new approaches to attack and compromise systems. Even so, you should in no way purchase or invest in security goods because of, or through vendor's attempts to scare you into obtaining them.

How do I determine what tools I need to implement, when they appear highly similar?

This can be a certain problem for buyers of security - the tools all sound roughly the identical, having highly similar claims, very similarly worded and they all sound like they do the same factor. Yet they can cost entirely different amounts. The actual factor driving that is the quantity of security investigation that the vendors are investing in their item development, this is one of the key differentiators in the security business. The vendors who are investing particularly heavily in original propriety systems and security search function are able to maintain their merchandise that a lot greater positioned to protect consumers systems and infrastructures against the type of attack they're going to see tomorrow and give that type of protection today. This is one of the primary factors in the costs.

Where do most of the threats to an organisation honestly come from, outside hackers or malicious insiders?

We see the headlines being produced in the media focusing on hacking attacks from external sources, breaking into systems, stealing confidential information, defacing systems and for this reason affecting brand equity etc. even so the majority of the funds is being lost is by means of internal attacks, for example exactly where an employee possibly has legitimate access to a database at a high level but then becomes disgruntled they may well misuse that privilege or be tricked into misusing that privilege in order to access a large amount of information which they might then sell on which is why it's the internal malicious insiders that trigger the most quantity of damage.

How do you train and retain skilled security specialists and is this expensive?

This can be a actual dilemma for organisations, when you invest in security tools such as firewalls and anti virus systems, you will have access to copious amounts of alert information from them. The challenge is then finding actionable security intelligence out of these tools, this can be outsourced to assist you analyze the information and decide if you really are under attack. There are specialist organisations who would own that problem for you, they can hover up all your alert information analyze and process it all and then they can call you if there's something your ought to be worried about. This is a particularly quick way to deal with this predicament.

How do you realize all the diverse elements involved with IT security?

If you are searching from the ground up, the security business can seem pretty complex. There are firewalls and remote access systems and virtual private networks systems and cryptography tools and so on. The answer to this is to appear at it from the top down, you require to approach this from the point of view of managing the risk to your business enterprise. If you fully grasp what risks your organisation is truly susceptible to and what the consequences are then you can get somewhat readily what tools you're going to have to have.

What is a "security policy" and what do I want 1 for?

A security policy is a frame function and a set of rules and guidelines for an organisation which aid it meet any objectives. If you do not know where you're going, how are you going to get there? Is particularly applicable here. This is why a security policy is very crucial simply because it assists you recognize exactly where you're attempting to get to by establishing, what your security objectives are for your organisation.

Why do security technologies seem to focus on "cleanup" when surely "prevention" is better?

Prevention is consistently going to be far better than cure. Clean up is rather inconvenient, if you just feel about your own desktop or laptop, if it gets infected with a virus, it has to be sent back to the IT department and you'll have to do with out it all day whilst every thing is reinstalled and even then all your information could still be lost. Due to the reality that attackers and attack trends are evolving all the time, its vital that security tools vendors and security development vendors are investing heavily in original security research so that they can ensure that their items are protecting against the type of threats that organisations will be exposed to tomorrow and prevent the poor things from happening right now.

How do I stop security just "obtaining in the way" of my day-to-day operations?

Security tools and processes can appear like they are obtaining in the way of day-to-day operations. This can be especially frustrating, perhaps those tools have not been appropriately deployed or wisely chosen or nicely configured. As long as we are still approaching this from a properly grounded risk based point of view for our home business then its relatively very easy to select correct tools and fully grasp how to deploy them.

I hear a lot about risk assessment becoming key to budgeting for security spending. How do I even start to quantify risk?

As a society we can be quite poor at assessing risk, often we'll fret about highly improbable risks and then ignore the obvious. For any given risk there are several points you can do, firstly you can mitigate the risk, so you can attempt to defend against it or control it. You could select to transfer the risk and pass it to somebody else like insurance for example. Or you could chose acceptance, you accept the risk is so unlikely or the cost of the devastation would be too insurmountable and disproportionate to mitigating against it in the 1st location. These are all perfectly acceptable attitudes towards managing and identifying a risk. In a risk assessment, when you have identified the risks to your small business, you can calculate some thing known as an annual loss risk acceptancy which is essentially you putting a value on what the impact to your business enterprise would be if that risk were to occur, you then make an estimate of how a number of times of year that's most likely to take place. When you've multiplied these two points together you can work out how significantly you're likely to loose should really this occur as a result of that risk from this you can then function out how considerably would be practical on dealing with that risk.

As a modest to medium home business, what are three effortless points I could do to speedily boost my security posture?

The first truly basic factor you could do, would be patching, it is important to maintain your systems up to data with the most recent software program patches released by the vendors, this is sometimes ignored for the reason that it needs down times to apply the patches but it is too harmful to ignore.The second thing you could do, would be to get really excellent user control over the accounts and logins and the user passwords systems, make certain no one is making use of certainly obvious passwords like name or registration plate. It also exceptionally crucial to remove accounts which are no longer required, if an individual leaves, or modifications departments. You also need to set correct access levels, it's a lot easier to just give everybody administration access but its not secure due to the fact you're giving them access to far more stuff than they actually have to have. The third thing you can do could possibly be a small harder you will need to realize no matter if the alerts you're finding from your tools are valid. This can be outsourced so you do not have to work your way by way of lots of data. Then the outsourced enterprise would alert you if there had been something you need to be conscious of.

What is the importance of patching?

The issue here is about the skill that the attackers can apply to acquiring weaknesses in systems and utilizing those in a remote and silent way to get control of your systems. Incredibly skilled attackers can make use of these defects in really devastating ways, they can get control of your systems remotely and access and steal information, they could put some malware on your program which would bring the system down and in the worst circumstances they could take over administrative control of the method completely which can be devastating, this is why its definitely very valuable to use patches and maintain systems up to date.

How can I be sure that security vendors are keeping a step ahead of the bad guys?

It is here that we can see research function carried out between the security vendors and technology developers and searching at what tomorrow's attacks are likely to be like and attackers who are continually advancing the state of their art. For the time becoming it doesn't appear like that race will be over.

Just about every new technologies I implement seems to introduce new security weaknesses, how can I resolve this?

It would be a shame for technologies deployment and progress to stagnate in the face or fears over security, the answer is to be approaching new technologies development from a risk management perspective so a thorough analyses of the type of risks you might possibly be exposed to as a result of deploying a new technologies is completely vital before you embark on the deployment and as long as you do that you can embark on new technologies rather safely and pick the required security stools processes staff training and other things to assist you manage the deployment to make sure it doesn't affect your organisations overall technology stance.

What is "penetration testing" or "ethical hacking" and how can it help me?

Penetration testing is honestly about you understanding what your systems look like from the point of view of an external extremely skilled attacker who's attempting to break into your systems, there are consumers who do this as a profession who can assess your systems by utilizing the exact same methods a skilled attacker would use, they may attempt to attack your systems over the network or the could possibly attempt to trick your people today into revealing passwords etc by phoning them and pretending to be from the helpdesk. Penetration testing and ethical hacking is the name used for this and its letting you see how your systems would cope if they had been to come under attack.

Admin
Admin

Posts : 836
Join date : 2011-07-05

https://fantasticweb.ahlamontada.net

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum