IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Vaccine Loaded Flash Disks

11 January 2008 By Saran

flash.jpgLG, one of Korea’s leading industry giants has announced the release of its Vaccine Flash Disk which will come in 512 to 8 Gigabyte models. The said hardware based protection is the company’s bet at getting it’s fair share of the Consumer Electronics market mainly in the computing industry. The said flash disk is pre-loaded with an anti-virus, malware protection which scans the system it is connected to removing and preventing further infection. The concept of hardware based malware protection has been in the works for quite sometime with motherboards that have anti-virus protection and hard disks that do the same. Flash disks have replaced the good old floppy in being the most prolific means of spreading of malware on earth. Being discreet and having ever larger capacities, they have been involved in infecting innocent computers and networks to corporate espionage and identity theft for their portability and small footprint being their worst trait.

Viruses and malware have long wreaked havoc on the computing industry since they were created in the 80’s and today’s viruses have gotten so sophisticated that even the FBI, CIA and other security and law enforcement agencies have become involved setting up their respective IT crimes divisions. The law has also caught up with steeper penalties and fines to offenders who do intentionally infect and create these malicious code that have caused millions of dollars in lost business revenue all over the globe. We should expect more of these hardware based-protection systems in the coming future for they might be the only way to protect media and other vulnerable Information Technology resources from attack.

Filed Under: General, IT Security Basics, Malware, Network Security, News, Real-World Issues, Security Policies, Storage Tagged With: Flash-disks, Vaccine-Flash-from-LG

IT Security – the outlook for 2008

28 December 2007 By Saran

think.jpg
Wireless networks and ways of protecting them will top most of the IT Security issues for the coming year. Predictions place wireless networks to slowly take over the now existing networks and development into WiMax which has more coverage area in terms of distance compared to WiFi is making this a fast reality. Players in the WiMax development include the biggest names in the wireless network area such as Intel, Samsung, Motorola and many more. Innovations will continue to push the technology to better and improved performance like never before.

Studies also show that more and more workers are turning to wireless computing for their network and office needs doing what they do in the most unlikely places such as coffee shops and anywhere else they can get a stable and sustainable connection. It also raises ethics issues for people will no longer be out of reach of networks and equally their jobs. Family time and other more casual needs for privacy and quiet time will be secondary for your boss can always reach you anywhere on the planet there is coverage of a network.

The death of satellite based communications has spurred rapid development of Voip allowing anybody connected to the internet instant access to telephone-like services without the use of dedicated telephone lines. This saves on telephone bills and has been in use heavily initially with call centers and has now shifted to mainstream use so more is to be expected of the technology in the years to come which may ultimately result in the death of the standard telephone service many opting for high-speed internet access instead.

The release of the Quad-core processors and planned development of more multi-core microprocessors fuels the future of laptop supercomputers which may come in following years. This and all of the better and improved technology will allow computing to soar into new heights making them a mainstay in our everyday lives for the future.

[tags]Multi-core Processors, Mobile Computing, Mobile Workforce[/tags]

Filed Under: General, IT Security Basics, Network Security, Physical Security, Privacy & Anonymity, Real-World Issues, Security Policies, Storage, Wireless Security Tagged With: Security-Outlook-for-2008, Wireless Security

It Security – Interpol

7 December 2007 By Saran

interpol.JPG
The threat of IT security has reached such a level that even Interpol has gotten involved in the action. Many crime syndicates operate beyond the normal bounds of borders and business organizations that the Policing Agency has information for all concerned regarding the security and intrusion prevention of computer systems.

The said Interpol IT Security document aimed for investigators of crimes related to IT security, highlights the need for an established set of rules that should be enforced for all people in business or other locations such as the home and elsewhere. In the said document, there is an extensive article that deals with information interception which is now becoming the most prevalent form of attack on networked computers. Firewalls are also not that effective if not configured properly and the addition of an internal and other security is needed to increase the level of protection that is needed. File deletion as may of us in the IT community knows deletes only the directory entry of the said file and not the file itself. It can be compared to deletion of a filing cabinet label without actual removal of the folder that contains the document itself. Utilities like Wiperaser Ultra for clearing deleted data are available on the market which routinely scans all tagged free-space on a hard drive and erases all the data contained within. There are also utilities available for the recovery of deleted files like software from Handy Recovery, a data recovery software which can prove valuable in security breach investigations checking for unauthorized files in an employee’s workstation. There are even recovery companies who specialize in recovery of data from tragically destroyed hardware such as those that have suffered fire damage and many more such as SalvageData whose specialty is to recover information from damaged hardware.

Filed Under: General, IT Security Basics, Malware, Network Security, Operating Systems, Real-World Issues, Security Policies, Storage, Tips Tagged With: Cyber-Crime, Interpol-It-Security, IT Security Basics

Flash drives… Blessing or curse?

7 November 2007 By Saran

ufdlg1.jpgFlash drives have become commonplace in just about anyplace where we use computers. These compact digital storage devices have replaced floppy disks, cd’s and other bulkier forms of storage that used to be the easiest way to transport data from point A to B. It also has the convenience of being as small as a keychain or an eraser so it fits just about anywhere like your coat pocket.

Enough of the good sides and to the bad sides of this technology for they are truly a security risk for they can become a propagation media for many problems such as viruses, worms and even be used to sneak information in and out of the workplace. Tis’ true that many a security programs such as programs that check for viruses and other problematic stuff contained within them but it is still very hard to determine if it does indeed pose a threat to the company or others who might be using the systems they are connected to.

Even the portable media players have the capability to be formatted to not only carry music but information as well. Products like the Apple’s Ipod series can be configured to carry video, audio and data in the form of files and documents. The only sure way to screen these products for stolen information is to scan them individually for any suspicious data/information. Their ability to connect to just about anything that has a USB port tends to raise the risks further.

Responsible use and strict control in their use and bringing into the workplace might sound a bit too paranoid but when conducted in the proper manner might provide some protection. Entry into restricted areas such as data centers and other server areas must also be looked into due to the potential for information leakage and the introduction of viruses and other dangerous programs.

Filed Under: Backups, General, IT Security Basics, Malware, Network Security, Real-World Issues, Storage Tagged With: data-security, Flash-disks, Mp3-Players, portable-digital-data-storage

Data Security and Integrity

1 November 2007 By Saran

Information is knowledge so information is power. Much so that data that is used, stored and shared within a business environment as all of us know is the subject of too much security that has data centers locked up away from the actual site. Some companies even have armored or secure clean rooms where if something was to happen in the actual office or work site the data center can survive anything under a nuclear blast. But most it professionals still forget the importance of integrity of data that is stored within these data centers.

Yes they have been secure for all the years the several servers have been sending and retrieving data to and from the data center but is the information that we work so hard to keep intact accurate? What if some malicious code somewhat managed to sneak past the thousand dollar anti-virus and other protective software? And has been wreaking havoc within the data center walls? I mean, they do not have to destroy or corrupt the data for as simple alteration of making 1’s into 0’s could be enough to reduce all the information stored within useless.

That is where redundancy comes in which many people now consider to be an old fashioned approach and a waste of important resources. Say a back-up tape/s of all the initial data that is updated with current data say yearly and processed with the same information that entered the data center in a parallel run to see if all was well. It might seem to be a lot of work and investment of manpower but it is assured to keep the integrity of all the information within, going in and out of all data centers. Say a 1,000,000.00 pension suddenly turned into a 1,100,000.00 pension, wouldn’t that ruin your day?

That’s why companies like RSA’s Enterprise Data Security offer in Data security and control systems to prevent such problems from arising in the first place. In any system, the weakest link is till the human operator who can easily misplace a file or other data that can make or break a company. So instead of having to develop their own systems for the same purpose, most opt to hire someone to do that job for them which allows the business to do what it was put up to do, earn a profit.

Filed Under: Backups, General, IT Security Basics, Network Security, Privacy & Anonymity, Real-World Issues, Security Policies, Storage Tagged With: Data-integrity, Real-World-threats, security

Disable that Shared Folder

1 August 2007 By Saran

Shared Folders

It would only be normal to find shared folders in the default setup of Windows operating systems. This can be easily seen once a person would go to the explorer option of his computer where shared folders are waiting to be accessed. This is automatically made for access if people connect to a network and would not set the security policies and accessibility on a restricted basis which only allows administrators to access them.

The importance of setting security levels to avoid such access to folders is important. Not al people are aware of the harmful things an unauthorized user may do once he gets the chance to intrude in another person’s workstation. Aside from probable back-ups, a person may lose the files contained in such folders if he is not careful. Hence it is best to do the precautionary measures before hand to avoid unwanted avoidable circumstances would ensue.

[tags]shared folders, security policy, network security[/tags]

Filed Under: Backups, Cryptography, IM, Instant Messaging, IT Security Basics, Network Security, Physical Security, Privacy & Anonymity, Security Policies, Storage, Tips Tagged With: Network Security, security-policy, shared-folders

Newer Posts
Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security