- Practical Network Scanning
- Ajay Singh Chauhan
- 328字
- 2022-07-12 10:43:05
Summary
So far, we discussed why infrastructure is an absolute requirement for today's internet world and what this means for system admins and internet users. We also learned how to build secure IT infrastructure and policy frameworks to protect information.
One of the major weaknesses in information security today is the human element. The everyday behavior of employees and end users represents one of the greatest risks to organizations and customers. IT technology is evolving faster than ever before. We are seeing new security controls, policies, and best practices put in place within organizations, but every day security breaches continue to take place. Nobody is 100% protected from small to large organizations. It only takes a simple mistake from an uneducated end user to leave a back door open in your information security. Organizations need to be aware of the people they work with, within the organization and outside as well. Developing adequate training and security frameworks for employee and end users becomes very important for protecting systems, especially considering the fact that it's not just technology which plays an important role, but also its users. I again repeat: if you have internet enabled devices, it is also your responsibility to secure them.
In 2017, Ransomware such as WannaCry, NotPetya, and Bad Rabbit have demonstrated the dangers of this threat and the potential impact on almost any industry. In 2018, it is predicted that IOT will be a big target for attackers in upcoming years, as well as Cloud infrastructures, Artificial Intelligence (AI), and of course the rise of mobile attackers increases daily.
In our next chapter we will discuss how to design secure infrastructure, keeping common risk factors in mind. This starts with placement of firewall and DDoS protection techniques.
Here is a famous quote to keep in mind:
“If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked”
― Richard Clarke
- 信息安全導論(在線實驗+在線自測)
- 可信計算3.0工程初步
- 數字安全藍皮書:本質屬性與重要特征
- 模糊測試:強制發掘安全漏洞的利器
- 網絡安全技術與實訓(第4版)(微課版)
- Learning Devise for Rails
- 云原生安全與DevOps保障
- Instant Java Password and Authentication Security
- Learning Pentesting for Android Devices
- 信息安全工程與實踐
- 信息內容安全管理及應用
- Practical Internet of Things Security
- 紅藍攻防:技術與策略(原書第3版)
- 5G網絡安全規劃與實踐
- 計算機病毒揭秘與對抗