{"id":86,"date":"2017-01-19T23:52:03","date_gmt":"2017-01-19T23:52:03","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=86"},"modified":"2017-01-19T23:52:03","modified_gmt":"2017-01-19T23:52:03","slug":"how-secure-is-your-company","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2017\/01\/19\/how-secure-is-your-company\/","title":{"rendered":"How secure is your company?"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-1689\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/now-panic-and-freak-out-27549-1920x1080-1.png\" alt=\"now-panic-and-freak-out-27549-1920x1080\" width=\"1920\" height=\"1080\" \/><\/p>\n<blockquote>\n<p><strong>How secure is your company?<\/strong><\/p>\n<\/blockquote>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-1686\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/cyber-attack-copy.jpeg\" alt=\"cyber-attack copy\" width=\"1000\" height=\"864\" \/><\/p>\n<p>Security is very important for websites, because of the obvious increase of web-based attacks and security threats. The investment involved in ensuring that data is secure has increased tremendously but security web apps make it easy to respond to attacks in seconds without any slowing down of the site. Security web apps ensure the safety of your financial information from common web threats no matter what platform you use in accessing the site<\/p>\n<h3><strong>Attacks on web apps<\/strong><\/h3>\n<p>Critical business functions are dependent on IT applications and most of them are web-based. However, there has been a substantial increase in vulnerabilities of web-based apps that impacts on both the business and the consumer. The business is financially impacted while the privacy of the end user is violated. 75% of attacks are now focused on web applications which require well-managed firewalls to provide sufficient security for a website. Web apps have their vulnerabilities because of the complex ways with which they are created. Usually a web app is composed of a mixture of codes and the integration of a multiple other applications that increases the potential points of vulnerability. In a recent study done by penetration testers, approximately 95% of web apps have some sort of vulnerability which requires strong security control over the IT applications and other associated processes<\/p>\n<p><strong>Counter-measures to security attacks<\/strong><\/p>\n<p>Intruders can be dissuaded from attacking web applications by forcing them to make incorrect assumptions by removing the signatures of technology platforms like the file extensions in HTTP, the TCP\/IP window size and services that are running on IP\/port combinations. A leeching attack on the other hand can impact on the bandwidth and responsiveness of your site. The solution to these leeching attacks includes the referrer checking through \u201ctime-limited\u201d or \u201csessionized\u201d URLs. It is also important to ensure that requests for file resources of the site are indeed from a web user that is on your site and not another site that is deep-linked to the file resources.<\/p>\n<p>Undesired use of website content can be blocked using IP access control. While it can limit your audience, you can minimize the vulnerability of your website and web apps<\/p>\n<p><strong>Attack Types<\/strong><\/p>\n<p>The following Attack Types were the primary ones considered when developing the Critical Security Controls. Each is listed with the most relevant and direct Critical Security Controls (by number) to help block, detect, or manage this problem<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Attack Summary<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>1<\/strong><\/td>\n<td>Attackers continually scan for new, unprotected systems, including test or experimental systems, and exploit such systems to gain control of them.<\/td>\n<\/tr>\n<tr>\n<td><strong>2<\/strong><\/td>\n<td>Attackers distribute hostile content on Internet-accessible (and sometimes internal) websites that exploit unpatched and improperly secured client software running on victim machines.<\/td>\n<\/tr>\n<tr>\n<td><strong>3<\/strong><\/td>\n<td>Attackers continually scan for vulnerable software and exploit it to gain control of target machines.<\/td>\n<\/tr>\n<tr>\n<td><strong>4<\/strong><\/td>\n<td>Attackers use currently infected or compromised machines to identify and exploit other vulnerable machines across an internal network.<\/td>\n<\/tr>\n<tr>\n<td><strong>5<\/strong><\/td>\n<td>Attackers exploit weak default configurations of systems that are more geared to ease of use than security.<\/td>\n<\/tr>\n<tr>\n<td><strong>6<\/strong><\/td>\n<td>Attackers exploit new vulnerabilities on systems that lack critical patches in organizations that do not know that they are vulnerable because they lack continuous vulnerability assessments and effective remediation.<\/td>\n<\/tr>\n<tr>\n<td><strong>7<\/strong><\/td>\n<td>Attackers compromise target organizations that do not exercise their defenses to determine and continually improve their effectiveness.<\/td>\n<\/tr>\n<tr>\n<td><strong>8<\/strong><\/td>\n<td>Attackers use malicious code to gain and maintain control of target machines, capture sensitive data, and then spread it to other systems, sometimes wielding code that disables or dodges signature-based anti-virus tools.<\/td>\n<\/tr>\n<tr>\n<td><strong>9<\/strong><\/td>\n<td>Attackers scan for remotely accessible services on target systems that are often unneeded for business activities, but provide an avenue of attack and compromise of the organization.<\/td>\n<\/tr>\n<tr>\n<td><strong>10<\/strong><\/td>\n<td>Attackers exploit weak application software, particularly web applications, through attack vectors such as SQL injection, cross-site scripting, and similar tools.<\/td>\n<\/tr>\n<tr>\n<td><strong>11<\/strong><\/td>\n<td>Attackers exploit wireless access points to gain entry into a target organization\u2019s internal network, and exploit wireless client systems to steal sensitive information.<\/td>\n<\/tr>\n<tr>\n<td>\n<table>\n<tbody>\n<tr>\n<td><strong>12<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td>Attackers exploit users and system administrators via social engineering scams that work because of a lack of security skills and awareness.<\/td>\n<\/tr>\n<tr>\n<td><strong>13<\/strong><\/td>\n<td>Attackers exploit and infiltrate through network devices whose security configuration has been weakened over time by granting, for specific short-term business needs, supposedly temporary exceptions that are never removed.<\/td>\n<\/tr>\n<tr>\n<td><strong>14<\/strong><\/td>\n<td>Attackers trick a user with an administrator-level account into opening a phishing- style e-mail with an attachment or surfing to the attacker\u2019s content on an Internet website, allowing the attacker\u2019s malicious code or exploit to run on the victim machine with full administrator privileges.<\/td>\n<\/tr>\n<tr>\n<td><strong>15<\/strong><\/td>\n<td>Attackers exploit boundary systems on Internet-accessible DMZ networks, and then pivot to gain deeper access on internal networks.<\/td>\n<\/tr>\n<tr>\n<td><strong>16<\/strong><\/td>\n<td>Attackers exploit poorly designed network architectures by locating unneeded or unprotected connections, weak filtering, or a lack of separation of important systems or business functions.<\/td>\n<\/tr>\n<tr>\n<td><strong>17<\/strong><\/td>\n<td>Attackers operate undetected for extended periods of time on compromised systems because of a lack of logging and log review.<\/td>\n<\/tr>\n<tr>\n<td><strong>18<\/strong><\/td>\n<td>Attackers gain access to sensitive documents in an organization that does not properly identify and protect sensitive information or separate it from non-\u00ad\u2010 sensitive information.<\/td>\n<\/tr>\n<tr>\n<td><strong>19<\/strong><\/td>\n<td>Attackers compromise inactive user accounts left behind by temporary workers, contractors, and former employees, including accounts left behind by the attackers themselves who are former employees.<\/td>\n<\/tr>\n<tr>\n<td><strong>20<\/strong><\/td>\n<td>Attackers escalate their privileges on victim machines by launching password guessing, password cracking, or privilege escalation exploits to gain administrator control of systems, which is then used to propagate to other victim machines across an enterprise.<\/td>\n<\/tr>\n<tr>\n<td><strong>21<\/strong><\/td>\n<td>Attackers gain access to internal enterprise systems and gather and exfiltrate sensitive information without detection by the victim organization.<\/td>\n<\/tr>\n<tr>\n<td><strong>22<\/strong><\/td>\n<td>Attackers compromise systems and alter important data, potentially jeopardizing organizational effectiveness via polluted information.<\/td>\n<\/tr>\n<tr>\n<td><strong>23<\/strong><\/td>\n<td>Attackers operate undiscovered in organizations without effective incident-\u00ad\u2010 response capabilities, and when the attackers are discovered, the organizations often cannot properly contain the attack, eradicate the attacker\u2019s presence, or recover to a secure production state.\n<p>Source: SANS 20 Critical controls <a href=\"http:\/\/www.counciloncybersecurity.org\/\" target=\"_blank\" rel=\"nofollow noopener\">Council On Cyber Security<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How secure is your company? Security is very important for websites, because of the obvious increase of web-based attacks and security threats. The investment involved in ensuring that data is secure has increased tremendously but security web apps make it easy to respond to attacks in seconds without any slowing down of the site. Security &#8230; <a title=\"How secure is your company?\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2017\/01\/19\/how-secure-is-your-company\/\">Read more<span class=\"screen-reader-text\">How secure is your company?<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1689,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[20],"tags":[],"class_list":["post-86","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gdpr"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/86","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=86"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/86\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=86"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=86"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=86"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}