Posts

Biometric Authentication Methods

Image
 There are many forms of biometric authentication, each with merits and demerits. The fingerprint identification is quite accurate and had been easy to be chosen since the majority is already familiar with it. However, it's subject to certain factors such as physical issues of cuts, or even dry skin that could affect fingerprint matching besides being vulnerable to spoofing attempts. The other famous approach is face recognition, which provides a passive authentication easily usable interface. In any case, it gives probably less accurate results under changing the lighting conditions or under different expressions of the face and raises some problems regarding the privacy of a person. Iris and retinal scanning are usually very good techniques in application areas where extremely high accuracy is required. Iris and retina patterns are unique and stable, hence the methods are highly resistant to spoofing. About which, while it is true that only the equipment is highly valued and a fe...

PHYSICAL SECURITY

Physical security is crucial to organizations, and the implementation safeguards businesses from potential threats. Here are some ways physical security threats are faced by organizations. Burglary or theft  Vandalism Unauthorised access Human negligence Sabotage tailgating Cyber attack   Here are some ways organizations can secure themselves from these threats: Site security locks can be particularly important and must be implemented in any business security protocol. Buildings can be locked to prevent access; this is important to a business that has a server room where gaining entry can be detrimental; gaining access might lead to damage by malicious actors. This method ties in closely with site security locks; the use of swiping a card or smart card, facial recognition, and fingerprints could be another alternative. It helps to track and identify individuals entering rooms and buildings and enables detection of suspicious activities. This will enable investigations i...

DATA LEAK

  Data breaches posses huge risks to organisations and they are required to report incident within 72hours of discovery. The breach needs to be contained as soon the organisation realises a data breach has occurred and identify how the incident occurred so that further damage could be mitigated.in some instances, individuals whose data is breached will need to notified about the situation. Individuals will be advised to change their passwords and be aware of any unusual activity on tier account. Lastly the supervisory authority will be alerted about the incident which they will then investigate the organisation which was breached to find out whether the breach could have prevented. In 2015 TalkTalk had a significant data breach led to a major change in data protection policies to make sure they comply with the Data Protection Act 2018, which saw the UK implanting the GDPR.   Whitelisting vs Blacklisting Whitelisting ensures that only trusted entities will be able to ac...

Backups & Data Recovery

  These are regular backups that will be needed when data losses occur due to hardware failures, malfunctioning software, human mistakes, and even the ever-increasing number of hackers. That's assuring business continuity and compliance with the laws in existence. The effective strategy includes both full and incremental backups in a mixed style. Cloud storage offers off-site protection, while using local storage, such as external hard drives, allows for faster recovery. As an example, a business might perform weekly backups to the cloud and daily incremental backups to both cloud and local devices. Cloud storage offers scalability and redundancy, while local storage enables rapid recovery. Also, regularly testing backups offers a chance to perform trial Often   when data is erased the space it took up is only shown as available; the data itself is not actually gone. Recovery techniques entail using data recovery software to look for and reconstruct deleted file traces on st...

Configuring Microsoft Defender Firewall

Image
                                                     Whitelisting IP Address Using Microsoft defender click on advanced settings which will give you more control over your inbound and outbound rules.   in advanced settings in the left hand plane click on inbound rules and then select new rule  Open Learn Access Control Lists screenshot - Completed 

INTRUSION DETECTION SYSTEMS & ACCESS CONTROL LISTS

  Intrusion detection systems also known as (IDS) are essential for protecting your network from being attacked by malicious individuals. they behave in a manner of security guards always monitoring the traffic from your network looking for suspicious patterns and threats which are commonly known. When any malicious activity is detected the IDS will notify you which will allow you to perform some sort of action before damage to your system can occur. There are two different types of IDS systems host based and network based. Host based detection systems better known as (HIDS) is directly installed on individual devices that are connected to the to your network. HIDS act like body guards for each machine and detect packets that come from within the network and other threats originating from host ensuring that the traffic from the host is not affected with malware trying to spread it across the system. Network based intrusion systems on the other hand also known as (NIDS) i...

WHY YOU NEED A FIREWALL TO PROTECT YOU

  Imagine a security guard standing watch at the entrance to your computer, carefully screening all incoming and outgoing network traffic. That's essentially what a firewall does. It's a crucial piece of software that protects your PC from unauthorized access and malicious activity. monitoring traffic : the firewall monitors traffic from the network for both incoming and outgoing packets. data is examined for anything suspicious. enforcement of rules : firewall can be configured with specific rules that determines what kind of traffic can be blocked. the rules are based on on factors like source and destination application and port number. application control : a firewall can control the types of application that can be allowed to access the internet. port blocking : ports on the network are like door to you computer. the firewall can block specific ports to prevent access . intrusion prevention : firewalls have features which are advanced that can detect and restrict attack...