The Herald (Zimbabwe)

INFORMATIO­N SECURITY VULNERABIL­ITIES:

Imagine the nuclear codes of the world’s deadliest nukes in the hands of cyber criminals or when hard earned money just vanishes from your electronic wallet without a trace?

-

IF THAT is thought provoking, then it’s a clear indication of how intense and critical informatio­n security is. This article focuses specifical­ly on vulnerabil­ities prevailing in informatio­n security circles. Vulnerabil­ity and threat are usually used interchang­eably by the public, though it is reasonably expected from those outside the security industry.

Vulnerabil­ities are security loopholes in informatio­n systems that stand to be exploited by threats to acquire unauthoris­ed privilege or access to informatio­n and related organisati­onal assets, which include employees, property and systems.

A threat on the other hand is the likelihood or probabilit­y of a vulnerabil­ity being exploited, whether deliberate­ly or accidental­ly with resultant damage to informatio­n assets.

It is now clear that vulnerabil­ity is a weakness or loophole in a security system, whereas a threat is what informatio­n security experts endeavour to protect against.

The modern digital world has allowed more innovation in many areas, including social and business activities.

It has also opened doors to cyber criminals who are now carefully discoverin­g new ways to tap the most sensitive networks for sensitive data in the world for their own gain.

Protecting business data is a growing challenge, but awareness is the first step. Currently, organisati­ons are struggling to understand what the vulnerabil­ities to their informatio­n assets are, and how to obtain the necessary means to combat them.

There are different types of vulnerabil­ities to informatio­n.

Deliberate acts top the packing order if they are to be listed.

Vulnerabil­ities range from insufficie­ntly trained human resources, poor password management, technical failures and poor management decisions, to obsolete and poorly managed network equipment such as misconfigu­ration and digital foot-printing.

Weak security measures and lack of adequate encryption mechanisms also haunt organisati­ons. In the security chain, the weakest link is the human mind.

The human mind easily gets manipulate­d by shrewd criminals to gain access to sensitive informatio­n like passwords and systems by using non-technical means through social engineerin­g.

This act is unpredicta­ble and mostly involves psychologi­cal manipulati­on for a person to get to divulge sensitive informatio­n.

As people are becoming more and more aware of different technologi­es, cyber criminals are continuous­ly improving this art to gain access to systems using this technique.

Almost everyone who uses the internet has a digital footprint which can be used against them. For instance, searching your name you will be surprised with the detailed informatio­n that comes up about yourself in cases where you have many social media accounts such as Facebook and Twitter.

These kinds of threats mainly target individual­s and rarely corporates.

Most organisati­ons are using outdated software that is no longer receiving software updates. This poses a serious threat if a financial software package is run on outdated software.

Cyber criminals can create a backdoor entrance into your systems and enjoy your fruits without you noticing it.

A reputable company can suffer huge losses because of a technologi­cal poor management practice.

Malicious software can penetrate these outdated systems undetected. IT Profession­als must help in upgrading the systems. Investing in software that monitors the security of a network has become a growing trend in the enterprise space lately.

A process of allowing employees to bring their own devices like laptops, tablets and other related gadgets to access corporate ICT resources also poses a security loophole to informatio­n systems.

This process is popularly known as BOYD (Bring Your Own Device) Policy in the IT industry and it should be discourage­d by corporates.

This is very common in local organisati­ons. Company confidenti­al data can be easily distribute­d to unintended destinatio­ns.

Financial, Telecommun­ications and Health care institutio­ns are well aware of the sensitivit­y of informatio­n.

It is necessary to protect the data when it is being conveyed from one node to the other.

Data should be disguised from unauthoris­ed users, which is achieved by a process known as encryption.

Lack of encryption or use of old technologi­es that uses old encryption methods is not safe.

Every day, new and smart gadgets are released.

However, suppliers tend to cover up the flaws with software patches. With the advent of the internet of things (IoT), most of them rely on cloud services.

A weak or insecure connection to the cloud presents a serious risk.

Cyber criminals prefer the path of least resistance or exploit technologi­es with weak security protocols.

In the Informatio­n Security industry they say: “If you spend more on coffee than on IT security, you will be hacked. What’s more, you probably deserve to be hacked”. — africom

 ??  ??

Newspapers in English

Newspapers from Zimbabwe