Jidaw Systems
(MASTERCOMPUTERS)


Stop that Intrusion, before it stops You!

 

Intrusions are a key issue in managing IT security. Do you use IT? Even if you’re not a security pros or experts, an awareness of security issues always helps. So what are intrusions? And what should we do to ensure our computing is safe from intrusions?
Individuals and management of organizations must determine the controls necessary to deter, detect, and respond to intrusions, consistent with the best practices of information system operators. The following are some tips and controls that should protect you and your organization from intrusions.

 

Authentication: Authentication provides identification by means of some previously agreed upon method, such as passwords and biometrics. Biometrics means a method of identifying a person's identity by analyzing a unique physical attribute. The means and strength of authentication should be commensurate with the risk. For instance, passwords should be of an appropriate length, character set, and lifespan, Lifespan of a password is the length of time the password allows access to the system.

Generally speaking, shorter lifespan reduce the risk of password compromises for the system being protected. Employees should be trained to recognize and respond to fraudulent attempts to compromise the integrity of security systems. This may include "social engineering" whereby intruders pose as authorized users to gain access to bank systems or customer records.

Installation and Update of Systems: When an organization acquires and installs new or upgraded systems or equipment, it should review security parameters and settings to ensure that these are consistent with the intrusion risk assessment plan. For example, the organization should review user passwords and authorization level for maintaining "separation of duties" and "need to know" policies.

Once installed, security flaws to software and hardware should be identified and cleared through updates or "patches"

Continuous monitoring and updating is essential to protect the organization from vulnerabilities. Information related to vulnerabilities and patches is typically available from the vendor.


comments powered by Disqus

 


Innovation is integral to Sustainability

IT Innovation for sustainable development

Read more

Samsung Galaxy Grand Prime: Important Features and Sincere Impressions

It's amazing how appearances can be deceptive! Imagine a device with a good design, a decent screen

Read more

Girls in ICT Day Events and Activities

Events and activities you can participate in or organize for a memorable Girls in ICT day. The theme

Read more

Self Worth, New Year

Central to thinking is self worth. How do you value yourself? Interested in staying ahead of the IT

Read more

Girls in ICT Day Events and Activities

Events and activities you can participate in or organize for a memorable Girls in ICT day. The theme

Read more

Level of OSS deployment and usage in Nigeria

Where is Open Source Software (OSS) in Nigeria? What is the state of OSS in Nigeria?

Read more

Self Worth, New Year

Central to thinking is self worth. How do you value yourself? Interested in staying ahead of the IT

Read more

Students face the Reality

Truly there is potential in the youth. We at Jidaw do not just see but we are amazed by the potentia

Read more

follow @jidawlist

DISRUPT THE STATUS QUO!

     
1.

Ideas are not enough. You must be action oriented to improve your future.

 

 
2.

Don't just think but act. You get results not only from thinking but from acting.

 

 
3.

You have ideas. You want to achieve. You want opportunity.

 

 
4.

But what are you still doing in your comfort zone? The comfort zone is a dangerous place.

 

 
5.

"I wanted to", "I was going to" cannot put on a light bulb, not to talk of moving you forward.

 

 
6.

Aren't you tired of hoping and criticizing? Stop defending status quo that locks you down.

 

 
7.

GO on the offensive now with IT Education and Empowerment.

 

 
8.

What is the use of ideas without action?

 

 
9.

Start becoming the achiever you deserve to be.

 

 
10.

MAKE SURE THERE IS NO STANDING ROOM FOR EXCUSES.