Monday, November 23, 2009

Hacker and Security System

If you see the title above will be remembered by the term Hacker, Cracker or even Carder. Many movies, novels or articles in magazines / newspapers that they will be reviewing it, actually who are they? Why now we need to concern about their eye out? Bbrp coincidence last week I was asked to fill out a seminar you know about Hacking & Networking on Linux in Jogja Expo Center.
The word itself is often caused hacking means different, although the original is an activity to find out the weaknesses of a system and even how to improve the ability of a good system software or hardware. So take a particular skill, such as good programming skills or understanding of electronic hardware ttg great. Whereas in the film and the novel is described only as an activity to be breaking into a system to take an advantage. Perhaps the most appropriate description for the hacking is in the movie The Matrix Reloaded, where Trinity is using a tool nmap (Network Mapper). In addition, many movies are just playing with the animation for describing hackers. Too many do-just use another tool for artificial people through a system, without great effort, we often categorize them as just œScript Kiddiesâ â € €?? or children who play with a script someone else. Actually, to be a good hacker, many hrs do business better understand TCP / IP, learn programming etc..

So why now we need to protect information systems in your company / organization we? Used at the time of the information system is still Closed Network and technology used its proprietary (pd specific certain companies), security threats are not so worry. Once we use the standard protocol TCP / IP (yg notebene elderly and simple), a network connected to the Internet, that's when our system becomes an easy target for mischievous orang2 out there. But such conditions it requires, for example banks hrs open Internet Banking services, hotels or travel agents to provide Online Reservation, a company must provide an e-commerce site for customer convenience, etc..

For that, I could not help the company must prepare a Security System (Security System) which according to the needs. One example is the firewall, such as self-employed security guard. Every guest went into an office, the guard will ask for the purpose, ask ID Card, then they will be recording our presence. The firewall will check every incoming access and compare with the policy, whether access is allowed or not. But it was not enough, then in the company must have installed CCTV Camera for supervising the activities inside. So although guests are allowed in, not necessarily that he did not do aneh2, for example, plant the bomb inside, steal something for take out, etc.. Usually Firewal addition, we will install IDS (Intrusion Detection System) which will oversee the data traffic, if any anomalies / peculiarities the IDS will alert could even get close the firewall for access connections at tsb.

Also, still needed more Authentication system ensures access to-be who, whatever may be inside, and recording their activity. For securing the line in order not bugged, required encryption technologies (encryption) so that the data are not easily read by anyone. And also required a centralized system for supervising / configure all security systems, such as space-equipped security guard monitors and Button2 lot for various activities.

Even more important is to teach to every user on the system for our company always careful when accessing a service exit. Type of attack-called Social Engineering Attack is an attack that utilizes user weaknesses. For example an email with the sender address for all users manager-it@apa.com request for to reply with include username and password, the reason will be upgraded to the new system. Or email asking us click to a website for downloading the latest antivirus demo, pdhl it is a virus or worm.

So in securing a system, many things must be considered reply. Not just buying software or security devices and then just installed. Wow, so busy is also yes if a connected system exit. Hence there is a mantra in the world that the Security â € œThe most secure system is unconnected Systema €?? Â € |. or even if ya want to secure all follow his motto of Andrew S. Intel's Grove is the founder of â € œOnly The Paranoid Surviveâ €??, Although it is actually more to the business strategy. Udahan dulu deh, meet again in another story.

source : dagdigdug.com

No comments:

Post a Comment

Make Money

Your Ads Here