GTSS Blog

GTSS has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

Brute Force Attacks
Let’s say that a robber wants to break into your home. He will try to go through a door, but he might not have the keys required to get in. In this case, he will have to use everything at his disposal to get in. He might try to kick the door down or smash a window. In other words, he’s getting into your house by brute force.

Brute force in computing can consist of a hacker trying to use as many passwords as possible in a short period of time to get in. There are programs that can randomly generate countless passwords in seconds, making this method of attack quite devastating when it’s effective.

Social Engineering
Let’s say that you have a new neighbor on your street. They ask you over for dinner and you get to know them. You feel like you are getting along with them quite well--well enough to trust them to water your plants while you’re out of the state on vacation for a few weeks. You give them a key, but when you come home, all of the plants are dead and you’re missing some furniture or technology. Yup, they’ve robbed you--you’re sure of it.

Social engineering takes a calculated approach to hacking and data theft. Hackers will make personalized attempts to steal your passwords and information by taking on the identity of someone you think you can trust with this information, like an “old friend” or “your elderly grandmother.”

Security Exploits
Robbers may try to find weak points in your front door. Maybe the door doesn’t quite lock all the way due to a defect in the manufacturing process. In this case, the robber may research what the weak points of the door are so that they can know the best and most efficient way of getting past your defenses.

Security exploits are weaknesses in software on your computer that allow hackers to sneak into your system and get into all sorts of trouble. These can range from weaknesses in the way that sensitive information is handled, to particular lines of code that create problems for your organization. Ultimately, it only takes a single crack in your defenses--a security exploit--to allow a hacker into your infrastructure.

Trojan Horse
Someone might knock on your door and tell you that something within your household is in need of repair. Maybe they know that you have a leaky faucet that needs to be addressed, or they know that you have some concerns about your furnace. They are then invited into your home and go about their business. You may then notice that you’re missing important items afterward, hinting that the off-the-street good Samaritan was, in reality, a scammer.

Trojans work like this in many ways. Just like the Greek horse of old, a Trojan sneaks onto your system and plants a backdoor, allowing for secret re-entry at a later date. Often times, a Trojan will use a larger data breach to mask its presence, and then continue to steal information in small doses as time goes on.

Two-Factor Authentication
Two locks are better than one in most circumstances. For example, you can have one lock on the doorknob and another on the deadbolt, which keeps the door fastened in place even if the door is forced open near the doorknob. Basically, having two types of locks makes it twice as hard to get to anything of value.

Two-factor authentication can be used to provide this secondary credential to your digital assets, including online accounts or network logins. A secondary code can be sent to an email address or mobile device, which allows your employees to access important information only when both of these are present.

Does your organization need help with network security? GTSS can help. To learn more, reach out to us at (803) 298-3008.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Hackers Microsoft Backup Google Software Business Computing Windows 10 Smartphones Business Malware Hardware Network Security Productivity Ransomware Hosted Solutions Android Disaster Recovery Small Business Computer Email Business Continuity Innovation Data Alert VoIP Efficiency Internet User Tips Data Backup Windows Social Engineering Law Enforcement Mobile Devices Smartphone Telephone Systems Cybercrime Upgrade Network Managed IT Services Operating System Miscellaneous Browser Server Virtualization Cybersecurity Computers Managed IT Services Communications App Social Media How To Office Chrome Quick Tips Collaboration Money Outsourced IT Data Breach Communication Flexibility Passwords Work/Life Balance Wi-Fi Gadgets Artificial Intelligence Automation Windows 10 Office 365 Safety Cloud Computing Bring Your Own Device Health Office Tips Remote Computing Mobile Device Management Google Drive Business Management Password Spam History Router Data Recovery Data storage Saving Money Government Internet Exlporer End of Support Automobile Mobility Marketing Best Practice Data Storage Microsoft Office Apps Private Cloud IT Management Facebook Hacking Word Gmail OneNote Public Cloud Data Management Physical Security Bandwidth Two-factor Authentication Unsupported Software Workplace Tips Downtime Phishing Black Market Spam Blocking Recovery Holiday Redundancy Productivity Avoiding Downtime IT Services The Internet of Things Data Security HaaS Specifications Virtual Reality NarrowBand HBO Amazon Web Services Risk Management Emails IT Support Remote Monitoring Computer Care User Error Solid State Drive Data loss Business Intelligence Worker Commute Networking Wireless Monitor Wireless Technology DDoS Online Shopping Politics Telephony Audit Update Search Samsung Screen Mirroring Millennials Current Events Outlook Patch Management Apple Laptop Evernote Keyboard Skype Computer Fan How to Value Internet exploMicrosoft Lithium-ion battery Chromecast Cast Workforce Knowledge Frequently Asked Questions Scam Reputation iPhone Touchpad Netflix Start Menu Legal FENG Google Docs Advertising BDR Network Congestion Excel Customers Managed Service Provider IT Support Tools Mobile Device Encryption Website Experience Sports Telecommuting IT Consultant Tip of the week Uninterrupted Power Supply Video Games Voice over Internet Protocol Battery Music VPN IT Plan Remote Work Content Leadership Windows Server 2008 Settings Managed IT Scalability Notifications Education Hybrid Cloud Wearable Technology Internet of Things Identity Theft Audiobook Employer-Employee Relationship Windows 7 Cleaning Botnet Root Cause Analysis Multi-Factor Security Computing Infrastructure PDF USB Save Money Software Tips Credit Cards Entertainment Flash Files Tech Support Travel Instant Messaging Trending Applications Information Technology Robot YouTube Going Green BYOD Fraud webinar Techology Relocation Shadow IT Windows 10s Meetings Comparison Users Amazon Conferencing Sync Humor Vulnerability Books Save Time Emergency Webinar Hiring/Firing Thank You Employer Employee Relationship IT solutions WiFi Congratulations Computer Accessories Loyalty Transportation Bluetooth SaaS Benefits Firewall Worker CrashOverride Assessment Smart Technology Rootkit Television Two Factor Authentication Training Public Computer Troubleshooting Vendor Management Big Data Electronic Medical Records Charger

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.