Category Archive Beginner

ByJayanthi

Types of hackers

In today’ post, we will see the different types of hackers:

 

Try Club Mahindra today!

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Have you heard about cyber diplomacy?

‘Diplomacy’ is defined as “the art of dealing with people in a sensitive and tactful way” and cyber diplomacy is a careful extension to that.

Social media is an absolute necessity for individuals, businesses and government organizations. Most major heads of state are present either on Facebook, Twitter and/or other social media platforms. Given the openness of social media platforms, interactions are easy at all levels with these social media channels.  It is also easy for heads of state to carry out conversations with each other and/or with ordinary citizens. 

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Definition of the day: Honeypots

“Honeypots” in network security is a computer system which entices hackers to attack it. ย All ports are kept open on the ย system and the computer acts normally with its services(but in reality, it is isolated and monitored) The main idea behind setting up “honeypots” is used to study the motives of malicious individuals and track their actions.

 

 

It must be noted that none of the production systems are connected to the “honeypot” system and no vital business information is lost during the “honeypot” project.

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

Mani Prithiviraj ByMani Prithiviraj

Conflict Resolution at the Workplace

Advances in Technology and Market Pressures have led to increasing expectations on growth and performance in our workplace. Expectations can rarely be met purely based on individual efforts. Successful accomplishment of organizational goals requires collaboration and team work. Goals have to be accomplished with a diverse workforce (based on age, culture, work-styles). This gives rise to interesting challenges. Conflicts at the workplace can significantly impact achievement of goals. In this article I am going to write about common causes for conflict at the work place and methods that can be used for prevention and resolution of conflicts.

Read More

ByJayanthi

Definitions: What is “Deep web?”

Coming close on the heels of my previous post –  “Dark web“, we will be defining “Deep web” in this blog post.  Similar to “Dark web, the “Deep web” cannot be searched by traditional search engines as well. So, what is present in this “Deep web”, which sounds so similar to “Dark web”?  Here are a few features of the “Deep web”:

1. They cannot be indexed by popular search engines as well.

2.  The “Deep web” has content that you do not want everyone to see. The “Deep web” contents are:bank account statements,  contents of your email , medical information, academic information, databases and any dynamically generated information.

While “Dark web” is associated with illegal content, “Deep web” does not have that connotation.

3. In addition, it does not require special browsers to view it.

As seen in the previous blog post, surface web(the place where we mostly interact like Facebook, Twitter and other social media channels), the “Deep web” and the “Dark web” are best represented by an “iceberg”. The iceberg is the perfect representation of the amount of information that is visible to us (which is hardly any!)

Join me as I uncover more of the tangled web in Information Security! ๐Ÿ™‚

 

 

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Definitions: What is “Dark web”?

“Dark web” which is not to be confused with “Deep web” is that part of the web which cannot be accessed by traditional search engines likes Google, Bing or Yahoo. In addition to this, it can only be accessed by special browsers like ‘Tor – the Onion router’ or ‘I2P'(Invisible Internet project). The “Tor router” enables anonymizedย browsing of the “dark web”.

“Dark web” domains end with “.onion” and are purposefully hidden from popular search engines. They are used to host a number of illegal activities.

 

Images source: Google images

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Social media security!

Continuously toying with a new idea for the technical blog post for several weeks, I couldn’t help but post about “Social media security” finally!

We live in an era where “sharing is caring” and the more we share with our friends and well wishers, the happier we are. Contrast this is to the time, when snail mail was sent and received only in  totally sealed envelopes that nobody could see! As times have changed and social media plays a huge role in most of our lives for different reasons, it is but necessary to adopt some safety standards as we share and care.

As an ardent follower of Information security practices I see how simple data sharing can potentially open the doors for invisible hackers. My InfoSec brain is, tuned and wired differently and I see social media broadcasts in a totally different way! This post lists certain vulnerabilities that social media presents and some common ways to avoid it.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Intrusion Detection systems

 

‘Perimeter security’ is placing defenses around an organization’s perimeter thereby ensuring that an organization’s chances of being compromised are minimal. Some of the components that are used to ensure perimeter security are routers, VPN, IDS, IPS, firewalls and so on. We will see one type of perimeter security device the ‘IDS’ or ‘Intrusion Detection system’ in this post.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Don’t cry….

….just remain vigilant about security issues surrounding you! The ‘Wanna Cry’ ransomware is the talk of the world having affected 150 countries including India, Spain, Britain, parts of Europe and crippling 2,00,000 systems globally.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚

ByJayanthi

Definition: Risk analysis

Risk analysis is a tool to implement risk management. Before we go onto see the definition of risk analysis, recall that a vulnerability is “weakness” in the system and the “risk” is the threat agent exploiting the vulnerability.

Some examples of the three concepts working together are when a vulnerability like an unpatched application is exploited by a threat agent like a malicious user to create risk. This risk can only be reduced by applying the patch to the application.

Risk analysis is done by the following steps:

a. understanding the vulnerabilities within the organization

b. assessing the value of the assets in the organization

c. calculating the value of safeguards that have to be implemented

d. Is the value of safeguard greater than the value of asset? If so, look for cheaper safeguards but equally effective safeguards.

While risk can only be reduced/mitigated or transferred, it cannot be entirely avoided. It is always good to remember that there is no such thing as 100% security!

 

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! ๐Ÿ™‚