Posts In Category "IT Threats"

Identity Theft

     -     Apr 22nd, 2014   -     Corporate WAN Threats, Uncategorized   -     0 Comments

What is Identity Theft? Identity theft is a crime whereby criminals impersonate individuals, usually for financial gain. In today’s society, you often need to reveal personal bits of information about yourself, such as your social security number, signature, name, address, phone number, cell number or even banking and credit card information. If a thief is […]

Read More →

Peer-to-peer (P2P) File Sharing

     -        -     Corporate Endpoint Desktop Threats   -     0 Comments

Introduction File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common forms of file-sharing technology. However, P2P applications introduce security risks that may put your information or your computer […]

Read More →

Malicious software (Malware)

     -        -     Corporate Endpoint Desktop Threats   -     0 Comments

Introduction Malicious software, commonly known as malware, is any software that brings harm to a computer system. Malware can be in the form of worms, viruses, trojans, spyware, adware and rootkits, etc., which steal protected data, delete documents or add software not approved by a user. Malware is software designed to cause harm to a […]

Read More →

Traffic (Packet) Sniffing

     -        -     Corporate Endpoint Desktop Threats   -     0 Comments

Introduction Its a cruel irony in information security that many of the features that make using computers easier or more efficient and the tools used to protect and secure the network can also be used to exploit and compromise the same computers and networks. This is the case with packet sniffing. A packet sniffer, sometimes […]

Read More →

Vulnerability Exploitation

     -     Oct 9th, 2013   -     Data Center Data Base Threats, IT Threats   -     0 Comments

It is common to find vulnerable and un-patched databases, or discover databases that still have default accounts and configuration parameters. Attackers know how to exploit these vulnerabilities to launch attacks against your organization. Unfortunately, organizations often struggle to stay on-top of maintaining database configurations even when patches are available. It generally takes organizations months to patch databases once […]

Read More →

Backup Data Exposure

     -        -     Data Center Data Base Threats, IT Threats   -     0 Comments

Backup storage media is often completely unprotected from attack. As a result, numerous security breaches have involved the theft of database backup disks and tapes. Furthermore, failure to audit and monitor the activities of administrators who have low-level access to sensitive information can put your data at risk. Taking the appropriate measures to protect backup copies of sensitive […]

Read More →

Denial of Service

     -        -     Corporate Endpoint Desktop Threats, IT Threats   -     0 Comments

Denial of Service (DoS) is a general attack category in which access to network applications or data is denied to intended users. DoS conditions can be created via many techniques. The most common technique used in database environments is to overload server resources such as memory and CPU by flooding the network with database queries that ultimately […]

Read More →

SQL Injection

     -        -     Data Center Data Base Threats, IT Threats   -     0 Comments

SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It is the type of attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands […]

Read More →

Excessive and Unused Privileges

     -        -     Data Center Data Base Threats, IT Threats   -     0 Comments

When someone is granted database privileges that exceed the requirements of their job function, these privileges can be abused. For example, a bank employee whose job requires the ability to change only accountholder contact information may take advantage of excessive database privileges and increase the account balance of a colleague’s savings account. Further, when someone […]

Read More →

Legitimate Privilege Abuse

     -        -     Data Center Data Base Threats, IT Threats   -     0 Comments

Users may abuse legitimate database privileges for unauthorized purposes. Consider a hypothetical rogue healthcare worker with privileges to view individual patient records via a custom Web application. The structure of the Web application normally limits users to viewing an individual patient’s healthcare history – multiple records cannot be viewed simultaneously and electronic copies are not […]

Read More →