- Practical Network Scanning
- Ajay Singh Chauhan
- 328字
- 2022-07-12 10:43:05
Summary
So far, we discussed why infrastructure is an absolute requirement for today's internet world and what this means for system admins and internet users. We also learned how to build secure IT infrastructure and policy frameworks to protect information.
One of the major weaknesses in information security today is the human element. The everyday behavior of employees and end users represents one of the greatest risks to organizations and customers. IT technology is evolving faster than ever before. We are seeing new security controls, policies, and best practices put in place within organizations, but every day security breaches continue to take place. Nobody is 100% protected from small to large organizations. It only takes a simple mistake from an uneducated end user to leave a back door open in your information security. Organizations need to be aware of the people they work with, within the organization and outside as well. Developing adequate training and security frameworks for employee and end users becomes very important for protecting systems, especially considering the fact that it's not just technology which plays an important role, but also its users. I again repeat: if you have internet enabled devices, it is also your responsibility to secure them.
In 2017, Ransomware such as WannaCry, NotPetya, and Bad Rabbit have demonstrated the dangers of this threat and the potential impact on almost any industry. In 2018, it is predicted that IOT will be a big target for attackers in upcoming years, as well as Cloud infrastructures, Artificial Intelligence (AI), and of course the rise of mobile attackers increases daily.
In our next chapter we will discuss how to design secure infrastructure, keeping common risk factors in mind. This starts with placement of firewall and DDoS protection techniques.
Here is a famous quote to keep in mind:
“If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked”
― Richard Clarke
- Extending Symfony2 Web Application Framework
- 白話網(wǎng)絡安全2:網(wǎng)安戰(zhàn)略篇
- Web漏洞分析與防范實戰(zhàn):卷1
- Metasploit Penetration Testing Cookbook(Third Edition)
- 特種木馬防御與檢測技術(shù)研究
- 諸神之眼:Nmap網(wǎng)絡安全審計技術(shù)揭秘
- Python Penetration Testing Cookbook
- 局域網(wǎng)交換機安全
- Building a Home Security System with BeagleBone
- Mastering Linux Security and Hardening
- 數(shù)字政府網(wǎng)絡安全合規(guī)性建設指南:密碼應用與數(shù)據(jù)安全
- 黑客攻防從入門到精通:命令版
- 信息系統(tǒng)安全等級化保護原理與實踐
- 網(wǎng)絡空間安全實戰(zhàn)基礎
- 云計算安全技術(shù)與應用