Skip to main content

Posts

Mitigating damage after a data breach

  Data security week 9   blog Mitigating damage after a data breach There are a few steps that you need to follow when mitigating damage after a data breach but first of all you need to understand that companies need to be prepared off the serious   damage of a data breach. The key steps that I'm going to explain will help companies to protect their customers and stop data lost by identifying vulnerabilities and fixing them.   Here are some steps that companies should have in place when dealing with serious damaged   breach of data ·         You need to contain the breach - this means once the organisation/company has realised that they have been breached the company needs true identify how the breach happened in the first place. the security team which is normally called that blue team in organisation / company will strengthen their security approach to prevent any further damage.   ·         Assess the risk - When assessing the risk we need to make sure that the
Recent posts
  Data security week 7 blog   Why is Backups important   The purpose of the backup is to create a copy of data that can be recovered in the event of a system failure. System failures can be the result of hardware or software failure, data corruption, a malicious attack (virus or malware), or accidental deletion of data. Backup copies allow data to be restored  would provide the means of restoring to a previous point after the incident has been dealt with. Backups is a vital method of storing data and keeping it safe, when you take your time and set up a good backup strategy you can ensure that data can easily be recovered. Storing copies of data on a separate device for example USB stick, an external hard drive, A disk ah storage system, cloud storage or tape drive   can protect you against data loss or corruption. most of these devices need to be at the location of your PC or laptop When trying to restore but you can store the devices in a safe place until you need it of you
  Data security week 6 blog Configuration of firewall and I had to keep your device safe using firewall There are many firewalls out there some that may cost money and some that are free today we're going to focus on zone alarm firewall. In this example I'll be using the free trial package for zone alarm usually zone alarm does have   annual costs fee for £54.95. Zone Alarm protect home users and small businesses from emerging cyber threats with the same next-generation technology trusted by the world’s largest companies, tailored to your needs. The ZoneAlarm Firewall protects your computer from most of those threats. It defines three security zones Trusted, Public, and Blocked. By default, the Public Zone works in High security mode, and the Trusted Zone works in Medium security mode: High security mode for Public Zone lets you connect to network resources but prevents other unauthorized network users and computers from accessing the resources on your computer and co
 Data security week 5 blog   Intrusion Detection Systems What is Intrusion Detection Systems? Intrusion Detection Systems or in short form IDS. Am going to refer to Intrusion Detection Systems as IDS. IDS is a network security tool that is used to for detecting vulnerability exploits against a target application or computer. Intrusion Prevention Systems (IPS) extended IDS solutions by adding the ability to block threats in addition to detecting them and has become the dominant deployment option for IDS/IPS technologies. IDS monitors network traffic for unusual or suspicious activity and sends an alert to the administrator user. Detection of anomalous activity and reporting it to the network administrator is one of the main functions however, some IDS software can take action based on rules when malicious activity is detected, like blocking certain untrustworthy incoming traffic. IDS can be host based or network-based systems.   How can IDS protect your network?   There
Data security firewall  What is a firewall? A firewall is network security device or software that monitors incoming and outgoing network traffic, it permits, or blocks network traffic data packets based on a set of security rules . The purpose of the firewall is filter out any malicious traffic like viruses and hackers and tonight access to the viruses and hackers, and it will allow safe network traffic through such as the Internet. By default, a firewall blocks all network traffic coming into the network it is protecting.  For the campus firewall this means that no traffic from the Internet can get on the Missouri State campus network without explicit permission.  To permit traffic through the firewall we create exceptions or rules that allow certain traffic on the network.  The rules are defined by the IP addresses of the sender and receiver of the traffic as well as the type of traffic e.g. web or SSH.  Types of firewalls Firewalls can either be software or hardware, though
  Password policies and importance of data Encryption. what is a password? A password is a secret word or phrase that must be used to gain admission to a place. A Password is a word, phrase, or string of characters intended to differentiate an authorized user or process for the purpose of permitting access, from an unauthorized user or put another way a password is used to prove one's identity or authorize access to a resource.   Passwords and passcodes are the most common way of authenticating users. Examples of their use includes the PIN (Personal Identifier Number) you use with your credit and debit card as well as the many passwords you are expected to remember when logging in to computer-based services. An ideal password must satisfy two conflicting aims. It should be: ·         memorable enough that the user can recall it without writing it down ·         long enough and unique enough that no one else can guess it.   How to create a strong password Using e
Data security – week 2 Microsoft Data Breach Microsoft is one of the most popular companies that everyone uses day to day, but did you know Microsoft had a data breach in July 2021. That Microsoft PowerApps data breach exposed 38 million records containing personal identifiable information PII. The data breach caused 47 major companies across multiple industries including the government and the public health agencies to be impacted and this data breach. The breach exposed personal identifiable information that includes names, COVID-19 contact tracking information, vaccination appointments, Social Security numbers call mom employee IDs and email address. Analysts discovered the open data protocol API for an organisation’s that power apps portable that contain  an anonymously accessible list lists of data. Microsoft Power Apps is a cloud-hosted suite of services that allows organizations to create business intelligence applications. Power Apps portals allow both internal and extern