Wayne’s job was slightly different from that of Gary because his seemed to be more enthusing and he talked about the thrill of it. he attended Eastern Illinois University and has spent most of his life in developing but now he is a data analyst and he loves it a lot. He analyzes data to find potential risk by basically applying analytics.
The Security Inside
Popular Posts
-
This past Tuesday December 3rd, 2013 we had two guest speakers from ADM , Gary Hotwick and Wayne Sharp. Gary is a Millikin Grad who graduat...
-
When windows 8 was introduced it came with a new form of password security with the picture gesture authentication. With time we realize...
-
The Linux operating system has a vulnerability within it for the past two years, it gives "untrusted" users with restricted accoun...
-
Adobe systems recently confirmed that it's network was breached during an attack in which 2.9 million of their customers had their infor...
-
There are certain common and serious database vulnerabilities that most businesses that deals with data should know of. Cyber attack has bee...
-
For small businesses or organizations that are lacking dedicated IT security staff using Linux can be very beneficial. There is a saying wit...
-
There is a zero day flaw in Internet explorer, this impacts all versions of the browser but it seemed as though criminals are more focused ...
Thursday, December 5, 2013
IT Auditing at ADM
Wayne’s job was slightly different from that of Gary because his seemed to be more enthusing and he talked about the thrill of it. he attended Eastern Illinois University and has spent most of his life in developing but now he is a data analyst and he loves it a lot. He analyzes data to find potential risk by basically applying analytics.
Sunday, November 17, 2013
Database Security Vunerabilities
The top on the list of the database vulnerabilities are deployment failures, when company are usually testing a software, they usually test to see if it is doing everything that it was designed to do, they never check to see if it is doing something that it was designed to do. Then there are the broken databases where most business don't keep their systems regularly patch leaving the database vulnerable.
There are a lot more of theses vulnerability that administrators need to keep in mind and look to best practices to make sure they are up to date some more of these vulnerabilities include data leaks when data is not encrypted with SSL or TLS, SQL Injections and Database inconsistencies.
http://www.zdnet.com/the-top-ten-most-common-database-security-vulnerabilities-7000017320/
Monday, November 11, 2013
Linux is more Secure than Windows
So why is Linux security basically better? When it comes to privileges, windows users by default gets admins access from the jump but with Linux you get the lowest level possible and then what you need will be added on. With that if there ever should be a virus it would then not be able to spread thus far to the root but stay local. There is also the social engineering factor where people are tricked to download malicious things on to their computer by means of social engineering, With Linux the user have to download, save, and exec the file.
Also Linux have a diversity of environments so it is difficult to just send out a virus to all of Linux unlike windows. Most users are using Windows so that's a hackers main point of attack. Most people can see and work on the Linux code so with that many eyes it is easier to catch any flaws and fix them quickly unlike windows where Vulnerabilities are not known until they can be fixed.
http://www.pcworld.com/article/202452/why_linux_is_more_secure_than_windows.html
Sunday, October 20, 2013
Linux vulnerability
The severity of the bug is in Linux kernel's performance counters subsystem and became clear when the code exploiting they vulnerability was publicly available. The script is used to take control of servers that are operated by many shared web providers. Basically hackers with limited control over a a Linux machine can use the bud to escalate their privileges.
Security is such a huge matter when it comes to business dealing, it was wrong for Linux not to publicly disclose this issue so that all that were affected can take the necessary steps towards avoiding that.
http://arstechnica.com/security/2013/05/critical-linux-vulnerability-imperils-users-even-after-silent-fix/
Monday, October 7, 2013
Adobe Data Breach
Adobe systems recently confirmed that it's network was breached during an attack in which 2.9 million of their customers had their information compromised. Information compromised includes customer names, passwords, debit and credit cards, and many more.
There was also a theft of source code for their products, Acrobat, ColdFusion Builder, and others. "CISO of Hold Security LLC as the poured over the contents of a server used by the cyber criminals recently revealed to have been behind damaging attacks on multiple data aggregators".

The Chief Security Officer Brad Arkin reported that there are no zero day exploits, so there shouldn't be any surprises but then encourages users to use just supported versions of their products. In response to the attack, the compromised password have been reset, and individuals and companies have been notified.
How did this affect businesses, well most of the big business in the world do use adobe products and what companies tend to do is that they have a common password for most of the applications they get. So what will happen is that now companies have to ensure that all those other password have been changed.
Adobe did indeed indicate that all the users whose account have been compromised have been notified to reset their passwords, there have reports of users whose old compromised password can still log into the Adobe Creative Cloud. It seems as though those systems are not connected to the reset procedure. They should just have all users reset their password entirely so that they do not forget parts of it.
http://www.securityweek.com/adobe-confirms-source-code-breach-theft-customer-data
http://www.pcworld.com/article/2052180/adobe-reports-massive-security-breach.html
There was also a theft of source code for their products, Acrobat, ColdFusion Builder, and others. "CISO of Hold Security LLC as the poured over the contents of a server used by the cyber criminals recently revealed to have been behind damaging attacks on multiple data aggregators".
The Chief Security Officer Brad Arkin reported that there are no zero day exploits, so there shouldn't be any surprises but then encourages users to use just supported versions of their products. In response to the attack, the compromised password have been reset, and individuals and companies have been notified.
How did this affect businesses, well most of the big business in the world do use adobe products and what companies tend to do is that they have a common password for most of the applications they get. So what will happen is that now companies have to ensure that all those other password have been changed.
Adobe did indeed indicate that all the users whose account have been compromised have been notified to reset their passwords, there have reports of users whose old compromised password can still log into the Adobe Creative Cloud. It seems as though those systems are not connected to the reset procedure. They should just have all users reset their password entirely so that they do not forget parts of it.
http://www.securityweek.com/adobe-confirms-source-code-breach-theft-customer-data
http://www.pcworld.com/article/2052180/adobe-reports-massive-security-breach.html
Monday, September 23, 2013
Internet Explorer Zero-Day
Hopefully all users are taking necessary measures to ensure that they and reduce their risk as much as possible. Microsoft should also send the "out-of-band" patch as soon as possible. Also some defense mechanism will include the use of "Address space Layout Randomization(ASLR)", It will not prevent it from happening it just makes it extremely harder.
http://www.networkworld.com/news/2013/091913-70-percent-of-business-users-273996.html?page=2
Sunday, September 8, 2013
Security of Picture Gesture Authentication
Though this gives us the opportunity to run freely with it and do something more personable it is becoming a problem as researchers notice that the gestures and pictures have a similar trend to it. Most users would choose the tap, tap, tap gesture and one of those will be the eye. it has become the most insecure and easiest to crack according to research.
Researches from Arizona State University, Delaware State University, and GFS Technology inc developed an attack framework and attack models. They found that people mostly choose one of their own photo instead of the one's they have been provided with. The relationship between background pictures and user's identity, personality, or interest with 60% of users selecting area are on an image where special object are located. Based on how long they take to setup the password, users most often will either circle a face, tap an eye or nose, and connect lips on pictures with faces. Now for the pictures without faces mostly spacial objects will be selected or connected.
The attack framework developed by the researchers got so advance to the point where it was capable of cracking passwords on previously unseen pictures in the picture gesture authentication system. This research will be presented to Microsoft so that they can find controls to ensure that their systems and their users are safe. Also to maybe revisit the rules and procedure on the picture authentication and run some testing to see where they can potentially improve and by how much they can improve.
http://www.networkworld.com/community/blog/researchers-develop-attack-framework-cracking-windows-8-picture-passwords?page=0%2C0
Subscribe to:
Posts (Atom)