You will get hundreds of articles on the internet on Security Fundamentals. But no one talks about the real concepts. They write on the things which sounds cool and easy to read. However, security fundamentals are not what they explain, it is more focused on principles of security of the network.
If you think practically then you will come to know that attacks can happen from two methods. One is from a physical approach and another one is through the network. So, we have to secure our network from technical things and physical security. But people focus on physical security only because they are not technically sound. An attack happens through their network and because of these, attacks are increasing nowadays. Therefore, knowledge of security fundamentals plays an indispensable role.
NOTE: To stop the attacks we have to be technically strong as well as physically strong.
Physical Security Fundamentals
Two years back, British Airways had canceled 400 flights due to which 75,000 passengers suffered. This happened because of an IT engineer who disconnected the main power supply to a data center near London Heathrow airport. When it comes to security then minor mistakes can lead to a big disaster impacting business reputation.
Public cloud provider companies have to give major concern to security because they have to handle the public-private data which costs in billions. So they give proper importance to physical as well as networks security. That’s why you may have noticed that big company don’t allow any mobile phones, pen drives, hard disks, laptops or any harmful thing. These devices can steal data or can impact the company even their employee can’t take these things.
Companies don’t allow any employee to enter in their data centers for security purposes. There are only some employees who can enter in data room for the maintenance and they are also scanned properly before entering. Because the company contains a lot of precious data of the users in their data center. So, if someone hacks the data from data centers or shut the data center power down even for 5 miniutes then the company has to face a huge loss. Moreover, it takes the company reputation down. Therefore, the company cares so much about its security.
Network Security Fundamentals
Nowadays, most attacks are happening through the network because the world is becoming more and more digital every day. So, for securing the network from the outer world, we have to secure our gadgets which we are using for networking like a Router, malicious email, etc. Examples of a common attack can be supposed as if an attacker hacks the router of the company from outside the network and put malicious code in it. So, here are the steps for securing a network.
1. keep The System and Patched Updated
Mostly user doesn’t update their device frequently. That is why a hacker is able to find the loophole to hack them. Updates are frequently dispatched by the company to patch their previous vulnerabilities. So that hacker can’t hack it through that loophole.
Therefore, when the company provides the update, hacker already knows that there is a loophole from which device can be compromised. So, if we don’t update your device regularly then, loophole exists in your device and hacker can easily hack them.
2. Use Strong Password
This is the most important and perhaps the easiest part to do because if your password is weak then the hacker can hack you within 2 minutes or so from Brute Force Attack.
Brute force is an attack which is performed to access the credentials of the user. For this attack, hackers have a pre-made dictionary which consists of some common password patterns. If a user has a common password which is predictable then it will surely be in the hacker’s dictionary. When the hacker will start a brute force, the password will match from that dictionary and they will get the credentials.
So, use a password which has words, numbers, special characters and most importantly which don’t make any sense like DjnJkGnds@4829#hksf
3. Secure VPN
Encrypting the data and the authentication of a user, these are the two major concern of a secure VPN. Encryption of data helps us in sending data from one location to another without any hesitation because if someone gets it then he/she can’t decrypt that without a key.
User authentication is one of the most important parts of security. This is because, if the user is not authenticated properly then anyone can easily hack the system by becoming a genuine user and company will not be able to authenticate that.
4. Manage User Access Privileges
Access to all users must be granted according to their work and for a specific period of time. For example, if an employee has a work and in that he/she wants access to any drive. So, the access of that drive must be given only for a specific period time in which that work can be done. If work will be still pending after that then you can reschedule time limit again. But, it will not be like that access is given for the whole day to the drive which is dangerous for the company.
5. Delete Inactive Account Immediately
The Inactive account should be deleted immediately. This is because most of the employee leave the company at any time and others join it. So, there will be a separate team for this who operate the accounts and delete them if not in use. If an inactive account will be there in the company then an employee who left the company can access their account remotely. This can harm the network by adding malicious codes or by any type of activity.
Also, Read | How to secure a network at https://breakingolds.com/what-is-vulnerability-assessment-steps-of-vapt/