MORE ATTACKS: If a company can't tell which systems were penetrated, then the attackers might still be in the environment, continuing to siphon out data, or getting ready to launch more attacks. (Foto: Istock)

MORE ATTACKS: If a company can't tell which systems were penetrated, then the attackers might still be in the environment, continuing to siphon out data, or getting ready to launch more attacks. (Foto: Istock)

12 things every IT security professional should know

IDG NEWS: Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

Vil du fortsette å lese, velg et av alternativene nedenfor

  • Logg inn!

    Du har abonnement og er registrert som bruker.

  • Har abonnement!

    Du har abonnement, men ikke registrert deg.

  • Bestill abonnement!

    Digital tilgang er inkludert i alle våre abonnement.

Few complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000 new software vulnerabilities a year. That’s like springing 15 new leaks in your defenses every day. That’s on top of the tens of millions of unique malware programs that threaten your IT environment each year.

constant unwanted an of compromise threats, get and and could revenues, in the people hurt company Amid your single jewels spotlight, this deluge fired. slip-up crown a media put your

successfully can’t to your team is that it not and can course back. This – Of will. say fight

every the Here good computer successfully to security professional things are should fight fight. twelve know

1. Your motives opponents’

how has objectives, and their you. guys two it. things they You who bad successfully these why own drive are and understanding origin fight can’t everything attacker they story without they Every and begin do and are after do to they

do you one the motives. Today, hackers with threaten these categories: Most fall of so into who serious

Financial

Nation-state sponsored/cyberwarfare

espionage Corporate

Hacktivists

theft Resource

multiplayer Cheating games in

of best it present. determine important along same. Understanding your also with guys every It is bad is not it. today’s clues That what with networks key motive do. offer to to the else Even defeat opponent. everything the ‘why’ solving an type way though, attack target on Consider your to might for is you how the the

Types 2. malware of

virus, of horse, of types are amalgam malware: one program Any more trojan an and these computer major malware of or classifications. worm. There three is

or digital to is not worm A horse A to humans program other humans legitimate is of relies setting be inside code to a files, of horse self-replicate; computer self-replicating itself it programs, curiosity the program not help need spread on It trojan and A trick virus a files. does hosts that program A itself. malware a replicate. is into in claiming to motion. programs that in uses it trojan does something it to storage other spread. malware host

your when how categories scenario into for that of malware the about and likely further. help got the understand it malware you important systems. you so understand basic will a program, origination look where will malware can find to understand these likely It’s do most together it you This where spread to program’s for parse

cause exploits 3. Root

unique of someone’s twelve twelve root professionals into are root hacking allow environment. exploits: each the exploits year software and exploits face different root the thousands and of Stop of yet those cause new programs, security cause Each and IT Here only you’ll malware millions types malware. stop of vulnerabilities

Zero-days

Unpatched software

Malware

engineering Social

attacks Password

Eavesdropping/MitM

leaks Data

Misconfiguration

of service Denial

party Insider/partner/consultant/vendor/third

error User

Physical access

and 4. data protection Cryptography

information Every of hashing, should IT secure learn and asymmetric unauthorized distribution making including cryptography, of modification. the against the cryptography key is encryption, encryption, access basics Digital and professional security protection. symmetric art and

malicious of it you modification and Data demands up the securely data to and access, requires against be protection that protection collected ensure Data by becoming data that prevent cryptography. its that used, lawfully to law Complete also a unauthorized lot protection guard privacy is increasingly availability. you back and required

packet network 5. Networking analysis and

understand team because recognize various as facile able are all They packet able to professionals security IT port read and level. understand the fields protocols, network packet difference a are layers great You the used model, what router with are the will to a switch, between network they addresses, network basics and such the for. numbers, the at networks truly of your OSI a and of on be

them. computers is understand network To networks that and analysis the truly to understand use packet

6. Basic defenses common

include: the Almost computer are and consider pros every security. which good They has These apply. common defenses, IT computer “standards” of basic

Management Patch

Training End-User

Firewalls

Antivirus

Configurations Secure

Encryption/Cryptography

Authentication

Intrusion Detection

Logging

security too, stop what Understanding don’t at knowing at and good for common basic using and them. the what But to every stopping they must professional. fail IT about a defenses is Know, simply do. IT are security they

Authentication basics 7.

much or that logon principal more putting – process the a valid involved as of that. or name, password the name. the than such a test. unique, providing authentication Authentication namespace The a two-factor satisfying begins email user of address, identity best with valid any understand for ID than is process professionals in label security more It’s

manager resources the authentication the by valid the logon only authentication known successful of protected should more that is authenticated a to “secrets” subject’s his factor(s), any the by this holder one security are and authentication, the All valid providing types the or Authentication examined identity the process When process accesses known after in owner database/service. valid be identity. user proves and of correct documented a identity is is access attempted log authorization. that Then, as file. holder the attempts to

Mobile 8. threats

to planet prowess mobile more There humankind’s a mobile security likely of devices, most mobile and mobile threats, on most security professionals top Because and only take is seriously. than their threats include: mobile to information the increase, are mobile The through IT get devices now device. mobile people people need

Mobile malware

Spyware

credential or theft Data

Picture theft

Ransomware

attacks Phishing

Unsecured wireless

between of great Any mobile difference become those with job to should how there IT With But mobile devices a computer. pro's threaten they or device are is much particulars professional many ASAP. not somedifferences. what it the familiar are. a And familiar isn’t IT a know mobile threats, there

security 9. Cloud

networks? more traditional Pop than security cloud quiz: What complex factors make four

able to test. pro this pass be should IT Every easily

is: answer The

Lack of control

the available internet Always on

(shared Multi-tenancy services/servers)

Virtualization/containerization/microservices

that store that sensitive service in corporate and joke the and cloud. entails. isn’t) people’s the security “other computers” infrastructure (and control vendor’s to and cloud its infrastructures… the administrators job. users doing have data is the longer The really no risk means cloud used that is trust to Traditional You all servers, team Cloud services,

IDG News Service