Saturday, June 3, 2017

Week 12: Review

Obviously, I think this blog would have been better if I had been able to keep up with it and post every week like I was supposed to. Unfortunately, life got in the way, between illness and surgery, and I was forced to post several of my assignment posts at the end. I've had many blogs in the past, and that seemed to always be my problem. I was gung ho in the beginning, and then as life gets in the way, blogging went by the wayside. I had a pretty popular political blog about 15 years ago, but then I got diagnosed with rheumatoid arthritis, and my interests got pointed elsewhere, and I took it down.

For my topics, I focused mainly on IT security issues, but there were a few deviations. For sources, I searched the internet to find articles rather than using our textbook. I tried to choose topics for each week that were interesting to me so that I can learn as well.

I think that a blog could be very helpful for a security professional. One, you can make a name for yourself if you are a good blogger. You can network and make contacts as well. Also, as a security professional, you should always be learning and reading about new things. A blog is a good way to keep yourself up to date, and push you to find interesting topics to read and learn about.

Week 11: What to Do When an Employee Leaves

Employees come and go, and from a security standpoint, this is an issue. What steps should you take each time an employee leaves?  CSO Online offers these checklist items:

1. Conduct an Exit Interview

During this interview, you should review document retention requirements, and discuss any equipment that needs to be returned. All company accounts should be discussed, and the employee should be reminded of any confidentiality agreements signed when they started. You should also insure that you have contact information if the company needs to contact the employee after they leave.

2. Collect all company-issued mobile devices, USB flash drives, backup disks, etc. 

IT should have an inventory list of what devices an employee has been issued to insure everything is returned when the employee leaves. By keeping good records, you can insure no data or device loss.

3. Deactivate all company email accounts, access rights, and remote access accounts

This step may seem like common sense to you, but you would be surprised at how often this is overlooked. All accounts that are assigned to an employee should be tracked in the event of employee departure to make account termination easier. This should be done immediately after the employee leaves, on the day of departure, especially if the employee is disgruntled in any way. Ideally, if an employee is being let go, their accounts should be disabled WHILE they are being let go so that they don't have a change to enact any revenge.

4. All shared passwords need to be changed

You should change all passwords that are used by multiple people that the employee might know. Again, this sounds like common sense, but it often gets overlooked.

For more checklist items, go here.

Week 10: Security and Project Management

For many Project Managers out there, security doesn't always play an important in what they do. However, security should be at the forefront of any IT project. When security is thought out and built into a project, your risks are reduced substantially. Security considerations should be injected into every phase of a project, no matter what type of project it is. Even during the actual project process, there are security concerns that should be planned for, such as backups for your project files in case of catastrophic computer failure, or an important file has been corrupted. Project Managers should follow the CIA triad of information security:

Confidentiality

Integrity

Availability

All projects can benefit from following the CIA triad.


To learn more about Security Best Practice for IT Project Managers, go here

Week 9 - Physical Security Innovations in 2017

Many people think that computer security is the most important issue in technology today, but you cannot discount the importance of physical security. There are new innovations in technology that have shown that physical security needs to continue to adapt and innovate as well. I'm going to discuss a few of those new technologies that have pushed physical security innovation.

1. Drones

The ever expanding number of drones being used by private citizens has caused a need for physical security measures that can combat them. It doesn't take long for a technology such as drone technology to be hijacked for malicious purposes. Drones can be used for industrial espionage, terrorism, and even surveillance for future crimes. DroneTracker  from Dedone has a system of interactive sensors that detect various types of drones based on noise, shape, movement.

2. Hostile Vehicle Threats

Vehicles targeting large crowds with the purpose of mass casualties is a burgeoning threat.
Vehicle barrier suppliers have their work cut out for them. Companies such as ATG Access
offer many products that would prevent a vehicle from ramming into a building or a central-crowded area.

3. Smart Phones and BLE

 Rather than adopting Near Field Communication, some in the field believe that smart phones and Bluetooth Low Energy might be the innovation of the future. This technology could make access cards obsolete.


Find out more here.

Week 8: Will Quantum Computers Break Cryptography?

There has been a lot of speculation that with the development of Quantum computers, cryptography will become obsolete. Mark Kim, contributor at Quanta Magazine, thinks not. Quantum computers are capable of calculations that are far beyond standard computers, and they would be able to factor a large number much more quickly. This puts standard encryption algorithms at risk. Since Google recently claimed that it quantum computers will be outperform any standard computer by the end of this year, cryptographers are concerned. Who will develop the quantum-proof security standard?

According to a paper on the Cryptology ePrint Archive, as fast the quantum computers might be, the RSA algorithm used in current encryption is faster. 

Read more here

Week 7 - The Future of Intrusion Detection

With the Internet of Things exploding, the need for intrusion detection grows exponentially as well. As more devices move online, the risk of attack goes up. cyber criminals continue to evolve and develop new ways and techniques, including anti-forensic techniques. Right now, most intrusion detection systems focus on, from the name, detection. However, systems in the future will more than likely detect suspicious events and let the security person decide if an investigation is necessary rather than detect intruders. There will be more forensics teams involved in incidents that are suspected to be intrusions. Also, artificial intelligence algorithms could come into play. Prevention will also be the emphasis in the future. A method that might come in to play more in the future is to obfuscate the attack surface so that the vulnerabilities are not able to be found. This type of defense is referred to as Moving Target Defense. Humans will become more involved in all aspects of cyber security as well. Human analysis will become more important, as well as forensic teams.



If you want to read more about this article has more in-depth information.

Week 6 - Remote workers and VPN

In today's workplace, telecommuting and remote workers are becoming more common place. But, from a security perspective, this causes some security concerns. How do you keep  your data safe while allowing workers o work from home? The answer is VPN! But how do you use VPN safely and efficiently for your remote workers?

First, you must consider your IT policies. Risk management is very important here. Go over your policies and create new policies where yours are lacking. You should make sure that your policies are clear and that your remote workers are trained in what they are allowed to do, and what they are not. You should set up clear guidelines and processes to request remote access, and have it set up on the employee's computer. It would be best to only allow company-owned devices to connect so that you can control what is on the computer. If security policies are set properly that will reduce your risk. Allowing employees to use their own devices brings up more security issues, but those could be mitigated as well.

Here is the article in whole