<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>B&#039;Cognizance &#187; I Secure</title>
	<atom:link href="http://bcognizance.iiita.ac.in/archive/aug-nov14/?cat=4&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://bcognizance.iiita.ac.in/archive/aug-nov14</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 04:56:11 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Detecting an Advanced Persistent Threat</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=928</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=928#comments</comments>
		<pubDate>Mon, 17 Nov 2014 17:03:03 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[I Secure]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=928</guid>
		<description><![CDATA[Today the threat landscape has changed. Hackers and scammers have grown smarter. Organizations these days face a much larger threat: Advanced Persistent Threat. There is no rulebook for hackers to break into a system. However an organization must ensure they follow a security and monitoring framework which ensures all the boundaries and threat areas a<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=928" title="Read Detecting an Advanced Persistent Threat">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>Today the threat landscape has changed. Hackers and scammers have grown smarter. Organizations these days face a much larger threat: Advanced Persistent Threat.</p>
<p>There is no rulebook for hackers to break into a system. However an organization must ensure they follow a security and monitoring framework which ensures all the boundaries and threat areas a covered. It is a challenge today not only to detect and remediate advanced persistent threat, but also to effectively address the issue in a timely manner.</p>
<p>There are three basic areas which need to be monitored and analysed to detect an Advanced Persistent Threat:<br />
1.	Network Traffic Analysis<br />
2.	Payload Analysis<br />
3.	Endpoint Behaviour Analysis</p>
<p><strong>Network Traffic Analysis:</strong><br />
Network traffic is one of most important data the organization needs to analyse to detect any threat or a break in. By analysing the inbound and outbound traffic, any compromised system or network should be detected. This can include for example traffic patterns. Based on usage a baseline should be created of all the activities, and these can be compared to real time events to detect any anomaly. </p>
<p>To further strengthen this network forensics is an important activity that an organization should look into. Forensics would capture, store and analyse network traffic and provide data analytics to improve detection and remediation.</p>
<p><strong>Payload Analysis</strong><br />
It is often very difficult to detect the actual extent of damage even when the compromise has been detected. Payload analysis helps in further analysing a malware or a compromised system to study its behaviour and detect the extent of damage it could have caused. It also helps in reducing false positive and also increases the effectiveness of detection. This is very effective in detecting malwares which bypass signature based verification.</p>
<p>However payload analysis is a time taking process. Moreoever sandboxing and replicating the exact environment is also a common challenge which all organisations face.</p>
<p><strong>Endpoint Behaviour Analysis:</strong><br />
Endpoint Behaviour Analysis aims to detect any unwanted or suspicious activity within the endpoints. It can be a network related activity originating from the end point or an application behaviour anomaly.</p>
<p>One of the interesting technology is Application Containment. In this a suspicious application or a compromised application is allowed to function in a container (thus isolating it from accessing from any other data in the system). Its behavior is monitored and it is fed with some similar data to simulate its activity. However this is a resource consuming process and often not very user friendly.</p>
<p>As the threat scenario is changing, information security is no longer the work of individuals. An enterprise wide approach needs to be undertaken, taking into all key stakeholders, management, business and IT to achieve a collective goal to securing an organization.</p>
<blockquote><p><strong><em>Rahul Das<br />
Consultant | Cyber Security<br />
PwC, India<br />
(IIITA, MS-CLIS 2011-2013)<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=928</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>When heart bleeds and shells shock!!</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=870</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=870#comments</comments>
		<pubDate>Fri, 14 Nov 2014 10:26:03 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[I Secure]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=870</guid>
		<description><![CDATA[In the past couple of months, many security bugs have shaken the cyber world to its very core. Some of these are said to be present and being exploited by attackers for many months and even years. While some need expert knowledge to exploit, you can exploit one attack on you own laptop. It does<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=870" title="Read When heart bleeds and shells shock!!">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>In the past couple of months, many security bugs have shaken the cyber world to its very core. Some of these are said to be present and being exploited by attackers for many months and even years. While some need expert knowledge to exploit, you can exploit one attack on you own laptop. It does not always take a smart attacker to breach a security system, sometimes an improper implementation and design makes things really easy for an attacker. Knowing about these bugs could teach a lot to present days and upcoming developers and security professionals. Here is a summary of three such security bugs which have leaked our information to attackers round the world for years and have been identified recently.</p>
<p><strong>1.</strong> The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. Why is it called Heartbleed?, because the bug is in the OpenSSL&#8217;s implementation of the Transport Layer Security (TLS) protocols heartbeat extension (RFC6520). The attacker can grab memory from a server, without leaving any traces. This gives attacker a copy of information in memory including keys, usernames and passwords, etc. This allows attackers to eavesdrop communications, steal data directly from the services and users and to impersonate services and users. Bug was introduced to OpenSSL in December 2011 and has been out in the wild since OpenSSL release 1.0.1 on 14th of March 2012. The vulnerability is classified as a buffer over-read.</p>
<p><strong>2.</strong> The ShellShock is a vulnerability in widely used bash command shell. Since bash is used in many systems and in many different forms, this can be exploited in various ways. This bug causes bash to execute commands when they are concatenated to the end of function definitions in values of environment variables. A remote attackers utilizes this bug to execute arbitrary code and commands without having proper privileges. To test whether a system is vulnerable, you can try popping open a shell/terminal and running this command :<br />
env X=&#8221;() { :;} ; echo you might be vulnerable&#8221; /bin/bash -c &#8220;echo hello&#8221;<br />
If “you might be vulnerable” pops up, your system has an exploitable version of Bash installed. Exploitable bash are also used in MacOS X, android and Windows Cygwin. Attackers exploited Shellshock using botnets to carry out distributed denial of service attacks. Shellshock also has the potential to be turned into a worm — a self-replicating piece of code that automatically propagates to all Shellshock-vulnerable systems, potentially causing untold damage. Shellshock was compared to Heartbleed in its severity.</p>
<p><strong>3.</strong> POODLE attack, Padding Oracle On Downgraded Legacy Encryption attack, is a name given to exploit that takes advantage of way some browsers deal with encryption. Most of the browsers use TLS protocol for secure communication, but revert back to SSL 3.0 when TLS connection is not available for interoperability. An attacker takes advantage of this, using Man-in-the-middle attack, forcing use of SSL 3.0. POODLE is used to target browsers that uses SSL 3.0 protocol for encryption and authentication. Attacker exploits a design flaw in SSL 3.0, that allows the padding data at the end of a block cipher to be changed so that the encryption cipher become less secure each time it is passed.</p>
<p>POODLE is an example of a vulnerability that succeeds thanks to a mechanism designed for reducing security for the sake of interoperability. Such flaws call for extra care when designing systems in domains with high levels of fragmentation. In such domains graceful security degradation may become common.</p>
<p>Google researchers Bodo Moller, Thai Duong and Krzysztof Kotowicz discovered (and named) the POODLE vulnerability and warned the IT community that the only way to prevent POODLE attacks is to stop using SSL 3.0.</p>
<p>Out of the above three, Heartbleed was rated most serious vulnerability which affected systems for nearly 2 years. It resulted from improper input validation (due to a missing bound check) in the implementation of the TLS heartbeat extension. This shows that it was an implementation issue and not a design issue. POODLE as already mention resulted because of reducing security for interoperability. Since this was done intentionally, it can be mentioned in the category of design flaw. To avoid such incidents in future, we should think like both an implementer and an attacker while designing and implementing protocols and software.</p>
<p>The only solution to be protected against these and against many more unidentified vulnerabilities is to keep system updated and remain yourself updated about new vulnerabilities.</p>
<blockquote><p><strong><em>Anurag Shandilya<br />
M.Tech (CLIS)<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=870</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ethical Hacking</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=866</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=866#comments</comments>
		<pubDate>Fri, 14 Nov 2014 10:19:04 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[I Secure]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=866</guid>
		<description><![CDATA[The term “Hacker” has two different meanings in the computer industry. Traditionally it is defined as “A geek who enjoys learning the computer systems in depth and how to increase their functionality” or “the one who enjoys doing programming and exploring new things in the computer system, either mechanically or electronically”. While on the other<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=866" title="Read Ethical Hacking">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>The term “Hacker” has two different meanings in the computer industry. Traditionally it is defined as “A geek who enjoys learning the computer systems in depth and how to increase their functionality” or “the one who enjoys doing programming and exploring new things in the computer system, either mechanically or electronically”. While on the other hand, in past few years, this term has been reformed to take a new meaning, “hackers are someone who intrude in any system for personal gain especially for the passwords and the confidential information”. Now-a-days, in current scenario, if you ask anyone that you are a hacker then firstly he/she will request you to hack the facebook account of any of his/her friend. In technical terms, former one are called hackers while the latter one are called crackers or criminal hackers.</p>
<p>Hacking is legal, but cracking not. Crackers break into the system with some malicious intent for some personal gain. These personal gain may be for fame, profit or even revenge. They can modify, delete and steal critical and confidential information from the victim system. Hackers have quite advanced knowledge of operating systems and programming languages. They know different security holes within the system and the reasons for such holes. They are keen to seek further knowledge, share their discoveries without having intentions for damaging or stealing data. On the other hand, Crackers gain unauthorized access, destroy important data, or in short cause problems for their targets. Whatever the case may be, people give hacker a negative outline. A person can be a hacker regardless of age, gender or religion. It just depends on the technical skill of the person which vary from one hacker to other. Some of the hackers barely know to surf the internet, whereas other writes such software on which other hackers depend.</p>
<p><strong>Types Of Hackers</strong></p>
<p>Broadly speaking, hackers can be classified on the basis of their skills and knowledge or on the basis of type of work they perform. If we speak about the former one, we can rename hackers as Coders, Admins and Script Kiddies, while the latter one can rename a hacker into three more specific terms White Hat hacker, Black Hat Hacker and Grey Hat Hacker.</p>
<p><strong>Coders:</strong> They are the real hackers, the one who revise the methods and the write the codes for the tools available in the market. They can find security holes in the software to create their own exploits.</p>
<p><strong>Admins:</strong> They are the guys who use the tools developed by the coders. They don’t write their own code and techniques but explores the tools at their best to find different tricks and techniques.</p>
<p><strong>Script Kiddies:</strong> They are the persons who reads out something on Internet, find few scripts online and apply them exactly in the same manner as it is specified on the Internet. They are the most dangerous categories. They can cause more harm because they don’t know what those codes and script means, they are simply applying it. They take advantage of the hackers’ tools and documentations available freely on the Internet, but they don’t have knowledge of what is going behind the scene.</p>
<p><strong>White Hat hackers:</strong> In simple language, you can call them as good guy or Ethical Hacker. They focus on securing and protecting IT systems. They use their knowledge to locate braches in the system and find counter measures in the resource.</p>
<p><strong>Black Hat Hackers:</strong> They are the second type of hackers which I stated earlier as Crackers or criminal hackers. They use their skills for malicious purpose and illegal activities. They break into others’ system for some malicious intent and focus on data stealing and security breaching.</p>
<p><strong>Grey Hat Hacker:</strong> They are intermediate of White hat and Black hat hackers. They can act sometimes legally, for the goodwill, while sometimes not. They might not have malicious intent, but sometimes can commit crime during the course of their technical exploits.</p>
<p><strong>Hactivist:</strong> They are another type of hackers who generally broadcasts political or social message through their work on the web. Recent example includes “the photo of Modi on website of AAP”. We can cover such persons under grey hat hackers.</p>
<a href="http://bcognizance.iiita.ac.in/archive/aug-nov14/wp-content/uploads/2014/11/11.png"><img src="http://bcognizance.iiita.ac.in/archive/aug-nov14/archive/aug-nov14/wp-content/uploads/2014/11/11-680x459.png" alt="Types" title="Types" width="625" height="421" class="aligncenter size-large wp-image-909" /></a>
<p><strong>Cyber Terrorists:</strong> They are the black hat hackers who generally attack govt. computers. They crash critical systems and steal confidential information from different specialized system specially govt. website.</p>
<p><strong>Why Hackers Hack??</strong></p>
<p>This is a quite good question for the argument, but we can’t specify the reason for the hackers to hack the system. It varies from one type of hacker to other.<br />
Some of the reasons may include:</p>
<ul>
<li>Exploring additional knowledge</li>
<li>Hacking for the hobby</li>
<li>Information stealing</li>
<li>Software cracking</li>
<li>And many more endless reasons…</li>
</ul>
<p><strong>Prevention from Hackers</strong></p>
<p>Ethical hacking in not illegal, it’s performed by the permission of the victim to explore something to the deeper level. If you ask me the way to prevent yourself from hackers then I’ll suggest only one thing: “don’t ever fight with any hacker. If you do, then please unplug your computer system and lock them away, so that no-one can touch your system, not even you!” But this is not the right way for the Information security, but this is important for you to protect your system from known vulnerabilities. You don’t have to protect your system from everything, In fact, you can’t even do so. However, we may adopt some techniques to prevent ourselves to a much better extent:</p>
<ul>
<li>Never share password with anyone, no matter how much he / she is close to you</li>
<li>Never click on any unknown / unwanted link that is sent to you through chats or emails</li>
<li>Avoid use of public computers</li>
<li>Avoid use of public networks, especially free wifi. Free may be dangerous.</li>
<li>Never use your personal online accounts such as emails or social accounts like facebook in any public network, NOT even in your office. Sniffers are all around.</li>
<li>Don’t hit open to any unknown software programs</li>
<li>Never let your PC be in touch with any of your friend who lies in any of the hacker categories mentioned earlier.</li>
<li>Use any good antivirus and spyware program</li>
</ul>
<p><strong>Different Phases in Hacking</strong></p>
<p>Here are the different steps that are performed by the hackers sequentially in order to attack the target.</p>
<ul>
<li>Information Gathering: Hackers seek to find out as much information about the victim as possible. They locate, identify and record information about their targets.</li>
<li>Scanning: In this phase, attackers scan the networks and ports to find out the vulnerable port.</li>
<li>Gaining access: This is the phase of real hacking. Once the hacker identifies about the vulnerable port, then they tries different methodologies to gain the access of that system.</li>
<li>Maintaining access: After gaining the access, it is very mandatory to maintain the access for at least the time being in which hacking is being performed. Interrupt in access will cause loss of data or even loss in the connection.</li>
<li>Performing required tasks: Once hacker gains access on the target system, they perform the required task on the target.</li>
<li>Clearing the logs and footprints: Last but not the least, hackers need to clear the footprints and all the logs from the victim system, so that it’s not easy for anyone to trace the hacker. This is the reason for which hackers are called as Anonymous.</li>
</ul>
<p><strong>Methods of Hacking</strong></p>
<p>Although there are countless methods for the hackers to hack into a system, and increasing day by day, major one includes the following, we are not going into the details as of now:</p>
<ul>
<li>Footprinting</li>
<li>Social Engineering</li>
<li>Denial of Service attack</li>
<li>Keyloggers</li>
<li>SQL Injection</li>
<li>XSS (Cross Site Scripting)</li>
<li>Spoofing</li>
<li>DNS Attack</li>
<li>Steganography</li>
<li>Reverse Engineering</li>
<li>Cryptography</li>
<li>Trojans and bombs</li>
</ul>
<p><strong>Laws in India for Hacking</strong></p>
<p>According to Pavan Duggal, Supreme Court advocate, First cyber law of India makes all cybercrimes punishable. These cybercrimes may include hacking, cracking, and publishing of information in the electronic form, damage to the computer source code, violation of confidentiality and privacy, and publication of false digital signature certificate. Different cases that gets covered in the laws include:</p>
<ul>
<li>Social media fake profile case</li>
<li>Email account hacking</li>
<li>Credit card fraud</li>
<li>Online share trading fraud</li>
<li>Tax evasion and money laundering</li>
<li>Source code theft</li>
<li>Theft of confidential information</li>
<li>Software piracy</li>
<li>Music piracy</li>
<li>Email scam</li>
<li>Phishing</li>
<li>Cyber Pornography</li>
<li>Online Sale of Illegal Articles</li>
<li>Virus attacks</li>
<li>And many others…</li>
</ul>
<blockquote><p><strong><em>Kamal Nayan<br />
Blogger at http://tipstricksandhacking.blogspot.in<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=866</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Big Data &#8211; Bigger Risk</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=817</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=817#comments</comments>
		<pubDate>Fri, 14 Nov 2014 09:12:31 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[I Secure]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=817</guid>
		<description><![CDATA[Big data analytics is among the current top three concerns of IT leaders, other important areas being IT Security and Mobile Device Management. With increasing thrust of organizations for catering more information, the size of data to be handled is getting bulkier. The idea of ‘Big data’is not mere expansion of traditional database but a<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=817" title="Read Big Data &#8211; Bigger Risk">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>Big data analytics is among the current top three concerns of IT leaders, other important areas being IT Security and Mobile Device Management.  With increasing thrust of organizations for catering more information, the size of data to be handled is getting bulkier. The idea of ‘Big data’is not mere expansion of traditional database but a lot more. It is not just data maintenance but also analysis and maneuvers of huge unstructured data using predictive techniques and other mathematical models and its conversion into insightful information adding business value.</p>
<p>Data being the most important and vulnerable asset for organizations is critical to kept secure. All the organizations are growing in terms of data they handle. From the inventory stocks to target and existing customer base, from social media content to web locks, each and every bit is adding to data to be stored and analyzed. Thus, leaving them with an only option of switching to Big Data. But, Big Data breaches will be big too, with the chances for even more serious reputational and legal damage than at present.</p>
<p>Big data is often characterized by 3Vs, Volume, Velocity and Variety of data. All the three attributes have their own challenges associated with them. Massive size of data is off course most prominent and coherent one. Velocity signifies both, rate at which data arrives and needs to be acted upon. Variety denotes the heterogeneous data, unstructured data and the issues related to it.The concept of Data has been highly evolved than the traditional times and so are the techniques to handle them. There has been a paradigm shift from traditional Relational databases where data was put into processor to BIG DATA where multiple processors are brought to the data. A technological shift has supported this change to happen. Platforms like Hadoop and frameworks like MapReduce and Storm. Several others technologies for real time analytics and graph computation are emerging as Hadoop has already proved unsuitable for many existing problems.<br />
Big data has resolved several issues like processing of adhoc queries and enormously flooding data through its parallel and powerful computational frameworks .Its distribution across variant silos and ability to tackle unstructured data makes it way superior than traditional analytic techniques. These scalabilities in turn lead to several bottlenecks for the analysts to handle. Following are certain vulnerable areas of BIG DATA which might lead to challenging situations if not tackled well.</p>
<p><strong>Heterogeneous Sources</strong><br />
End Point Input Validation is important to ensure integrity of data sources. Due to massive amount of data to be dealt, it becomes more challenging and increases the vulnerability. </p>
<p><strong>Insecure Data Storage</strong><br />
Data being stored at thousands of nodes, secure storage ensuring Confidentiality, Integrity and Availability of stored data itself becomes challenge.</p>
<p><strong>Insecure Data Processing and Computation</strong><br />
Untrusted computation programs can be submitted and used by the attacker to extract critical information from data sources or to manipulate the sensitive data. Several attacks like denial of service can also be initiated by the attacker.</p>
<p><strong>Data Mining and Analytics leading to Privacy Breeches</strong><br />
Monetizing of big data needs data mining, analyzing and ultimately sharing of results. This might lead to privacy breeches, invasive marketing and disclosure of sensitive information.</p>
<p><strong>Cloud Adoption</strong><br />
Switching to Cloud for storing enormous data proves to be a boon but at the same time it outsources the security of the owners’ critical data to a third party and hence becomes vulnerable.  </p>
<p><strong>Insecure Access Controls</strong><br />
Big data implementations include open source code leading to unrecognized back doors, intruders and default credentials. Also, authentication and access from various sources may not be secure enough.</p>
<p><strong>Auto- tiering</strong><br />
It creates two repositories of data ‘Hot data’ and ‘Cold data’. The data which is accessed less frequently is moved to Cold Data which is lesser secure medium. This might be risky if the cold data is sensitive one.   </p>
<p><strong>Compliance Monitoring</strong><br />
Real time monitoring of compliance is a big time issue that should be taken care of due to the excessive amount of data and alerts generated by big data.</p>
<p><strong>Audits</strong><br />
Regular audits and governance become even more necessary yet challenging due to highly distributed and unstructured nature. Timely audits in conformation with universal compliances are indispensible to ensure that the data is not yet compromised.  </p>
<p>Big data was initially thought and designed with a concept of scalability i.e. accommodating huge volume and variety of data and responding to the queries at earliest. Security issue was not much thought of, which is lacking and need to be made scalable with the amount of data being accommodated. </p>
<blockquote><p><strong><em>Sonika Singhal<br />
MBA-IT<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=817</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Information security : A Paramount concern of organisations</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=799</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=799#comments</comments>
		<pubDate>Fri, 14 Nov 2014 08:52:25 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[I Secure]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=799</guid>
		<description><![CDATA[“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” – Stephen Hawking With the changing business dynamics and the alignment of the business goals with the information technology to have a single integrated holistic governance and management structure,<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=799" title="Read Information security : A Paramount concern of organisations">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p><em>“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.”</em> – Stephen Hawking</p>
<p>With the changing business dynamics and the alignment of the business goals with the information technology to have a single integrated holistic governance and management structure, it is vital to have controls to safeguard IT related systems. Information technology has proved to be a goal enabler for businesses.Enterprise boards, executives and management have to embrace IT like any other significant part of the business. External, internalrequirements related to enterprise use of information and technology is significantly increasing and if breached, proves to be fatal.</p>
<p>Information has become a key asset for any organization. Information technology plays a vital role in the information management cycle. Safeguarding information technology related systems from internal and external threats should be in line for any business strategy in order to have continuity of services and stakeholder satisfaction. Infrastructure and costs can be retrieved but lost reputation due to security failures and breaches of confidentiality, integrity and availability prove to be threatening for any enterprise striving for long term business relationships and industry reputation. As proposed, a layered architecture to information technology security with control checks on internal and external threats mitigates the risk of security breaches.</p>
<p>Information technology assests pertaining to the enterprise need to be identified and controls to safeguard them must be cost efficient .Safety and precaution complement each other, in order to attain safety, precautionarymeasures are adhered to with the identification of the system and its transactions. Information technology security scope has been diversified extensively .Human intervention isthe foremost security vulnerability within an enterprise. Employees turnout to be the biggest threat to any IT related system, though the intervention may or may not be a conscious one, it still directs the system to a fatal security threat .With the people, process and technology sitting at heartof any layered architecture security model it’s obvious and threatening that the biggest vulnerability, “people”, rest backs safely unguarded at the core. Social engineering, downloading malicious content, data misuse and the lack of information put the system to a scenario of unknown exposed risk of impounding security threats. The employees are not even aware about the security policies and instill the critical information systems to a threat level which is maximum and fatal in nature. Much has to be done to establish cost effective  controls to minimize and monitor this internal threat .Information Technology is vital for any business goal attainment along with realization of customer satisfaction delivery and if left unguarded-its threatening to the value both in monetary and reputational foregrounds.</p>
<blockquote><p><strong><em>Ashutosh Joshi<br />
MBA-IT<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=799</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
