Security Articles

GOSINT – An open source intelligence gathering and processing framework

GOSINT – the open source intelligence gathering and processing framework. GOSINT allows a security analyst to collect and standardize structured and unstructured threat intelligence. Applying threat intelligence to security operations 

The GOSINT, is an Open Source Threat Intelligence platform that helps us to identify and process the threat intelligence. GOSINT analyses structured and unstructured threat intelligence and helps a security analyst to identify different Indicators of Compromise (IOC) which can be driven into other tools like CRITs, MISP, or directly into log management systems or SIEM.

For detailed information on GOSINT, please click on attached pdf file.

Authored By - Nadish Shajahan and Mohammed Farhan
TCS Cyber Security Practice

Moving to Cloud: Security Risks and Securely Adopting Cloud

In order to have a competitive edge in the market and to meet the ever-growing customer needs, organizations are now switching to a virtual infrastructure offering more distributed, agile and flexible services as compared to the traditional computing which is referred to as “Cloud Computing”. 

NIST defines cloud computing as: “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” 

Microsoft SQl Server Database: Making Aware of Database Security

Securing your database from Cyber Attack is most important. Database Security involves a different type of mechanisms to protect the database against Intentional or accidental threats.

Microsoft SQL Server provides various security models including integration with Windows Authentication to provide robust security platform for managing your organization's information. Security can be managed across all database objects including tables, views, stored procedures and at a very granular level. Database encryption is now available as well to secure SQL Server database at rest.

Please see the attached document to read more about Transparent Data Encryption, Backup Encryption, SSL Encryption, Best practices to secure your SQL server and more.

Errors in Security Technical Documentation: What Can Go Wrong?

Errors in Security Technical Documentation: What Can Go Wrong?

Technical documentation is either the first or the last stop for users looking for authentic information. Documentation has a main purpose of linking ideas, technologies, processes, and products with people who need to understand or use the products in an "audience-friendly" way. 

With regards to Technical Documentation, the quality of the document should be built into the process. This is best done by detailing the requirements for the service or product or tool during technical documentation as creation is one of the key aspects to it. 

How to achieve quality?

Create a style guide: The style guide defines the language to be used. Defining this early on ensures that consistent, unambiguous words and phrases are agreed, so making the document and review process simpler.

Are we still hesitant about the importance of security in wireless implementations?

Are we still hesitant about the importance of security in wireless implementations?

In our day to day to life, wireless technology like Bluetooth, Wifi is playing an important role to an individual and also all organizations when it comes to deploying wireless networks, applications, and devices to improve employee productivity. But the concern is when any confidential, personal and private data is flowing over the wireless path, how are we confident that our data is secured or doesn't get tampered or stolen in air transit. Here comes the importance of wireless security for our home networks and all organizations when it comes to deploying wireless networks, applications and devices and this article will shed some light on the basics of wireless security and it's importance.

Defense-in-Depth – What Strategy To Follow?

Defense-in-Depth – What Strategy To Follow?

Defense in depth (also known as Castle Approach) is an information assurance (IA) concept in which multiple layers of security controls are placed throughout an information technology (IT) system. It is the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack.

How to exploit Cross Site Request Forgery attack on web applications where request is posted in JSON format!

Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. With a little help of social engineering (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker's choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state-changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.

Please see the attached pdf to read more about How does a CSRF attack works and what are the recommendations to protect yourself against this attack.

PCI DSS standards meets the requirements of the GDPR?

The objective of both the PCI DSS and the GDPR is to ensure an organization’s personal data is in a secured manner. The main focuses of PCI DSS are on payment card and cardholder data, whereas the GDPR focuses on European residents’ personal data. The main difference is that the GDPR is less prescriptive than the PCI DSS.

The GDPR provides guidance on what needs to protecting but does not clearly defined a detailed action plan, but PCI DSS has clearly defined an objective that what needs to be achieved and given clear direction for securing the payment card and cardholder data.

The PCI DSS as standards to achieve the objective of GDPR 

Perturbed over login ID and password data breach? Not anymore!

In recent years, we have been hearing of numerous ‘Login ID’ and ‘Password’ related data breaches involving popular websites and other online services. It is also likely that your application credentials are listed in a massive file that is floating around in the Dark Web. These can lead to “Loss of Trust” with customers. Loss of Trust leads to ‘Loss of Brand Loyalty’ and eventually results in ’Loss of Business’.

Lets us see how these security issues can be encountered. Most of us will obviously come up with a solution toward multi-factor authentication and risk/behavioral authentication. This, apart from being the obvious solution that could pop-up, multi-factor authentication often creates conflict between ‘compliance requirements’ and ‘user convenience’. Ideally, we should be thinking about a solution to fortify the application security - without compensating on user experience.

IoT Security in 2018

The Internet of Things (IoT) offers the potential to exchange information and insights in real time, across a connected network.

The number of IoT devices increased 31% year-over-year to 8.4 billion in 2017 and it is estimated that there will be 30 billion devices by 2020. The global market value of IoT is projected to reach $7.1 trillion by 2020.

IoT involves extending internet connectivity beyond standard devices, such as desktops, laptops, smartphones and tablets, to any range of traditionally dumb or non-internet-enabled physical devices and everyday objects. Embedded with technology, these devices can communicate and interact over the internet, and they can be remotely monitored and controlled.

Gartner identifies the top 10 Internet of Things (IoT) technologies as below:-

Pages

Subscribe to RSS - Security Articles