Monday, October 4, 2010

Information security training






                                         Information security Training


Data’s importance

Today, the world is well developed with full of technology using every where. Each and every field are implementing latest technology into their business to make it more efficient and effective. Any business, if you take there will be collection of data’s and they want to store all those data’s safely and securely from unauthorized persons. Let’s have a look at what is information, how to protect it and what are the trainings we need.


Provide safeguard to information

Information security training is nothing but learning the safe and secure way to protect any information from an unauthorized person. Basically, information is the key ingredient for any concern whether it is a bank or education institution or company etc. All of them must have their own information about their company, their employee details, and company details and so on. Some information may not important. But some information say, for bank, it is necessary to protect their bank holder account details securely. It should not reveal the details to any third party at any cost. So they need to protect their data from being accessed by any unauthorized persons.

Third-party access

By undergoing this kind of training, you could learn how to protect your office or companies data safely and securely. Because to the extent the technology developed, the fraud ness also increased. Some anonymous persons are following some illegal techniques to find out the login credentials and other important information of others without their knowledge. So it is very important that every one should aware of this information security system so that they could be in safer side.

Importance of training

In information security training, they will train you how to protect your data’s from third-parties. One of the main training is CISSP that is certified information systems security professional. This training will explain you a broad range of techniques across security policy development and management as well as technical understanding of all range of security controls to protect the information of your company.


Once you undergone this training you will gain the in-demand career skill like a professional security tester. They will train you the methodologies, tools and manual hacking techniques used by testers in order to safe guard your data’s. You will come to know about ethical hacking, penetration testing, intrusion prevention, application security, wireless security etc. These all are different kind of training which helps you to learn all possible ways to avoid any third party access to your data’s.


Social engineers

Usually, the persons involved in this kind of illegal acts are considered as social engineers. These engineers would follow simple and complex techniques to gather the information from any unknown persons. Mostly, they will contact the people through mobile or through emails. Some people would send an anonymous email from fake websites to third parties asking their login credentials or bank account details.


So it is always recommended to learn or get trained about the information security techniques from an expert so that you could save your data from unauthorized access.


         

                                    Information security training


Importance of security

Information, a collection of data which actually associated with other information. It might be sensitive or non-sensitive. When it is considered as sensitive, there is a need for security. So the sensitive information should have to protect from access by third parties. So let’s have a look about how to give security to the sensitive information


Security for data
Information means data or Meta data collected together to provide some specific details about particular thing. For example, say bank information. It consists of bank name, bank account holder name, account number, its branch, and type of account, balance etc. Though each entity is differing from each other, all are related to one bank account holder details. So individually it is data but as gathered it is information.
Like this, all companies, school, colleges, banks, factories etc have their own information maintained in written paper or in system. They are maintaining these data’s for future use.

Security training to protect data

When these information’s are sensitive, it is probably necessary for the corresponding company to maintain it safely and securely from third party access. Thus security plays major role in all fields. In order to provide security to your information it is necessary to undergo information security training.

Nowadays many institutions are providing information security training through talented experts in order to avoid the fraud ness and unauthorized access to their data’s.  There are many securities training available such as ethical training, data recovery training, computer forensics training, wireless security training etc.

Ethical training
In ethical training, they will go in-depth into the techniques used by malicious, black hat hackers by providing you hand-on lab exercises. So that you could manage repeatable, documentable penetration testing methodology at any point of time. In data recovery training, you could learn the method about how to retrieve the data that is accessed by an unauthorized person.

Computer forensics

Nowadays the rate of fraud, abuse and downright criminal activities on IT systems by hackers, contractor, and employee is increased and it is necessary for all corporate companies and information security experts to perform computer forensics in order to avoid such bad happening in future.


For example, it is very important for the bank sectors to protect the sensitive data’s of their bank holders confidentially from third party access. So they would always design their database with maximum security constrains. But the problem would arise from the bank holder’s side. Yes! The persons who want the bank details of a particular person will get their data just by using hacking techniques. Like, creating a fake website which would look like the original one and send the URL link to the bank holders email ID asking their log in credentials. Normally we would always provide the details if it is asked from known website. But actually we were not aware that it is a fake website.

So in order to get rid of this problem, we all should have to get proper training about the information security. Nowadays, most of the corporate companies and IT sectors, IT department of all companies are providing information security training to their employees in order to avoid fraud ness.





                                            Social engineer media

Hardest form of security attack

Social engineering media plays a top role in security attack to gather confidential information from an individual person illegally. The person who is doing this kind of hacking is known as social engineers. This media has its own techniques and tricks to follow for successful social engineering. These engineers would follow those simple or complex techniques to manipulate others to reveal information without making any suspicion.

Most of the social engineers would contact the people through email or mobile or using the website that are being used by users most often. It actually kills on qualities of human nature such as to desire to be helpful, tendency to trust and fear of getting into trouble. It is the most effective method to retrieve required information around security obstacles. Till now, this method of hacking is the hardest form of security attack.

Methods:

In order to persuade someone, the social engineers would follow two methods:

A direct route
A peripheral route



Let’s see in detail about these methods.

Direct route method

In this method, the persuader would use systematic and logical arguments to stimulate a positive response prompting the user to provide the information without suspicion.


Peripheral route method

Here, the persuader would use peripheral cue that is unnecessary cues, mental short cuts and misrepresent their objectives to prompt them for acceptance without hesitation. Sometimes the persuaders would make some statements to the target people that make a strong emotion like fear or excitement.


We could broken the social engineering into two categories, namely

Human-based and computer-based


In human-based, person to person interaction would happen to retrieve the required information. But, in computer based, instead of direct invention of human, the computer software would collect the needed data’s from the recipient system without their knowledge.



Impersonation

Case studies are stating that the main target of the social engineering media is help desk. Because, the social engineer would know at least some basic information about the employees. Even if he does not know he would collect it. So when he needs some other personal data, he will call to the helpdesk and get the required information even the confidential one.


In computer based, the engineer would design the software which would be pop-up window or email attachment. In this case, whenever the recipient open the email, the virus would attack the system and gather the information from the system and send it back to the mailer without recipient knowledge.


Unknown websites

Another way is by using entertainment or social networks. For example, to play a game or chat with someone you need to register yourself with the corresponding websites. Some websites may ask your personal Id’s and password by saying registration purpose, but here the intension is to gather the data’s without your recognition.

Phishing:

Phishing is a technique in which the phisher would send an email that appears to come from a legitimate business like bank or credit card company and ask your bank details, home address, ATM pin etc.

So it is advisable for all, to aware of this social cheating media’s to protect you and your secured information.









                                                Social Engineer media



About  media

Today, Media’s are playing a major role in most of the fields. It is an intervening agency or instrument which works as an intermediater to provide or gain information.
There are many media’s such as mass media, news media, advertising media and social engineering media etc. Let’s have a look on social engineering media.


Social engineering media is the one kind of security attacks in which the social engineer manipulates a particular person to reveal secured information to steal data, access computer or cellular phones, cash and even your own identity. This kind of security attacks might be simple or complex. But their intension is to gather the required information using the social engineering techniques.

Social engineers
The social engineers who want to gather others information would contact them over the mobile phone or through websites they are visiting often. We could also say it is an illegal acquisition of sensitive information or improper access privileges by an unknown person by establishing legitimacy in the mind of the target.
It is an act of psychological manipulation introduced by hacker-turned-consultant Kevin-mintick. It is simple form of fraud applies to trickery or cheating for the purpose of gathering confidential information from others.



Usually the social engineers would use the techniques that are associated with social engineering which are based on particular attributes of human decision making.  There are various combinations of attack techniques are there, some of them are Pretexting, diversion theft, phishing, IVR or phone phishing, baiting etc. Other types of common tricksters or fraudsters are also considered as Social engineers.

Tricks and techniques

Nowadays the popular techniques include spoofing or hacking IDs of the people using famous e-mail IDs such as Gmail, yahoo, hotmail etc. This kind of hacking is frequently happening all over the world to find out credit card account numbers and their passwords, Online banking Id’s etc. They would also hack private emails and chat histories and edit them to extort money and creating distrust among individuals.


Social engineering media kills on qualities of human nature. The truly successful social engineers would get any information from any people without the sign of raising suspicion as to what they are doing. It is the hardest form of security attack to protect against because it cannot be protected with hardware or software since they are directly contacting the people for confidential information...

Categories 

So for successful defence we need to make awareness to the public about this and should ensure them to follow it strictly. SE is based upon two categories such as human-based and computer-based.

In human-based hacking, a person would interact with another person directly through mobile or emails to get some confidential information. But in computer-based, there will be human interaction but not directly. They will create a software in such a way in which it would retrieve the desired information from the target with or with out their knowledge.

In some cases, the SE’s would produce virus and Trojans and send through an email to get the information. So it is always advisable to be aware and cautious about these social engineers or cheater to avoid such bad occurrence.




No comments:

Post a Comment