Senin, 29 Juni 2009

Security risks for your IT infrastructure

Security has always been an important part of any IT infrastructure. It means protecting your information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. But, there will always be people who will try to infiltrate or want to access your network to do their malicious deeds.

As the security technology improves, simultaneously the skills of these hackers. But what can we do to protect ourselves from these threats?

1. Physical Attacks

We can set a policy in place that prohibits the use of any type of external storage device. Also, we can use Read Only Domain Controllers (RODC) that helps the networks concerned. Further, the BitLocker feature, which is designed to protect data by providing encryption for entire volumes, helps to protect sensitive data.

2. Comprise Pass-phrases in place of Passwords

A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource. Password policies should use encryption method, which is if less than 15 characters long, is automatically stored in backup. So instead of a password, have your users come up with a passphrase instead. And please do not write your password for someone else.

3. Avoid phishing attacks through E-mails

The rise in specifically targeted e-mail attacks has been of significant concern to security experts. Such attacks are both harder to detect than mass phishing attacks and more likely to be acted on given the fact they are customized to their recipients, including things such as their name and official title.

You can receive an e-mail claiming to be from your bank or from your HR department, claiming that a new policy is in place and it’s required that you change your password for security reasons. You provided the password and credentials, which is used by the bad guys for their benefits.

5. Be cautious on self-replicating worms

A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes and it may do so without any user intervention. Although, worms do not corrupt or devour files like a virus, they usually consume your PC’s bandwidth.

Recently, the Conficker worm had caused so many problems to networks are still around and Microsoft announces a $250,000 bounty on the head of those who created it. A new variant known as Conficker B++ has also been spotted in the industry and the IT industry’s attempts to bring it down.

6. Increasingly Malicious Malware

Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. Although most of the malware is not malicious in nature and is usually referred to as spyware, malware includes computer viruses, worms, Trojan horses, most rootkits, dishonest adware, crimeware and unwanted software.

7. Have a heads up on Unauthorized Network Access

One of the biggest challenges for any organization is to keep an eye on the person who wants to access the network that should not. Fortunately, we have tools like Network Access Control (NAC), which uses a set of protocols to define and implement a security policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. It forms a standard, when met, the computer is able to access network resources and the Internet, within the policies defined within the NAC system.

There is also Network Access Protection (NAP), which is used for controlling network access of a computer host based on the system health of the host.

Rabu, 24 Juni 2009

Life insurance

Life insurance or life assurance is a contract between the policy owner and the insurer, where the insurer agrees to pay a sum of money upon the occurrence of the insured individual's or individuals' death or other event, such as terminal illness or critical illness. In return, the policy owner agrees to pay a stipulated amount called a premium at regular intervals or in lump sums. There may be designs in some countries where bills and death expenses plus catering for after funeral expenses should be included in Policy Premium. In the United States, the predominant form simply specifies a lump sum to be paid on the insured's demise.

As with most insurance policies, life insurance is a contract between the insurer and the policy owner whereby a benefit is paid to the designated beneficiaries if an insured event occurs which is covered by the policy.

The value for the policyholder is derived, not from an actual claim event, rather it is the value derived from the 'peace of mind' experienced by the policyholder, due to the negating of adverse financial consequences caused by the death of the Life Assured.

To be a life policy the insured event must be based upon the lives of the people named in the policy.

Insured events that may be covered include:

* Serious illness

Life policies are legal contracts and the terms of the contract describe the limitations of the insured events. Specific exclusions are often written into the contract to limit the liability of the insurer; for example claims relating to suicide, fraud, war, riot and civil commotion.

Life-based contracts tend to fall into two major categories:

* Protection policies - designed to provide a benefit in the event of specified event, typically a lump sum payment. A common form of this design is term insurance.
* Investment policies - where the main objective is to facilitate the growth of capital by regular or single premiums. Common forms (in the US anyway) are whole life, universal life and variable life policies.