Hope is what makes us strong. It is why we are here. It's what we fight with when all else is lost.

Sunday, 3 May 2015

12th Week: Solutions for The Threats Faced by Air Asia and Its Consumers (Part 1)

Sunday, May 03, 2015 Posted by Unknown No comments

The security threats is faced by both the Air Asia (company) as well as the customer (external).
Therefore there are several ways that Air Asia can do for preventing and dectecting the internal threats:

1. Stop Unauthorized Access even when Credentials are Lost, Stolen or Compromised

password security policy
39% of all malicious data breaches* are the result of negligence including password theft. Social engineering has been used to describe the various means of conning people to reveal personal information such as passwords.
Source: Symantec ® “Malicious Attacks Catching Up & Costing More” 2013
UserLock stops malicious users seamlessly using valid credentials. It reduces network vulnerability by making it impossible for a rogue user to use a valid password at the same time as their legitimate owner. This is made possible by preventing concurrent logins.
In addition, by restricting user’s individual access to the network by physical location (workstation or device, IP range, department, floor or building) and setting usage/connection time limits, UserLock ensures unauthorized access is no longer a possibility – even when credentials are compromised.

2. Manage the Threat of Shared Passwords

Despite the increase awareness, shared passwords represent a real problem in organizations, as highlighted by the US patient-record security breach. By using other people’s passwords an individual from a partner company gained unauthorized access to the medical records of up to 1,800 patients within Hospitals.
hipaa network security
With UserLock, the ability to prevent concurrent logins decreases the likelihood of users to share credentials as it impacts their own ability to access the network.
UserLock provides the motivation to adhere to password security policy and help protect the organization’s critical assets.

3. Ensure Access to all of the Organization’s Critical Assets is Attributed to an Individual Employee

Specific events need to be associated with specific users for accountability. Organizations need to know exactly who is on the network and what they are doing.
Concurrent logins
With UserLock’s granular rules and policies to secure network access, accountability and non-repudiation issues are removed.
UserLock automatically identifies each unique user making them responsible for each and every activity.

4. Offer Immediate Response to Suspicious or Disruptive Access Behavior

UserLock empowers IT by monitoring, recording and automatically blocking all suspicious sessions.
What’s more, it can proactively deal with suspicious or disruptive employees to reduce the risk of malicious activity. As soon as any suspicious access event is detected, UserLock can alert the administrator, offering IT the chance to instantly react by remotely locking, logging off or resetting the appropriate session.
secure-user-access-insider-threat

5. Perform Accurate IT Forensics in the Event of any IT Security Breach

In addition to real time session surveillance and monitoring, UserLock records all session logging and locking events in an ODBC database (Access, SQL Server, Oracle, MySQL …) giving IT administrators the ability to support accountability, legal investigations, and internal trends analysis.
If an IT security breach does occur, UserLock will provide accurate, detailed information about who was connected, from which system(s), since what time, for how long, etc.
IT-forensics-insider-threat

6. Educate Employees on Data Security

Employees need to understand what security policies and procedures are, why they exist and what security measures are used on the network. Informed employees are the second line of defense! (logins are the first!)
From CERT best practices, “A consistent, clear message on organizational policies and controls will help reduce the chance that employees will inadvertently commit a crime or lash out at the organization for a perceived injustice.”
UserLock allows an organization to notify all users prior to gaining access to a system with a tailor-made warning message. Messages about legal and contractual implications discourage employees from committing cybercrime or lashing out at the organization for a perceived injustice.
educate-users-insider-threats


Source : http://www.isdecisions.com/blog/it-security/prevent-insider-threats-from-both-malicious-and-careless-activity/


Written by Andina F.S

0 comments:

Post a Comment