Skip to main content

Top 5 Myths about the Information security

Hello friends, 

Image result for top 5 mythHere I would like to share something new to break your thoughts or myths about the Information security world. Many time in news channels, news papers,  social media you have read or watch on information security threats, cyber crimes, hacking etc. Most of them are presented the way like it creates fake hype or in reverse situation sometimes it is totally neglected. Based on those news, posts people sometime get some misunderstanding or stuck in their own belief. Here I will share about Top 5 myths of the information security and along with this I will explain the truth. 


Myth #1 

Hackers are thieves or criminals who grab the money from your account.   
Image result for white hat hacker

True. but not exactly. Hacking is not limited to money stealing or cracking website or data theft. It is a broad term which also include patching the security loopholes into any network or system. Hackers may also good guys who hired by the organisation to patch their vulnerabilities of the network or application. These guys are authorised to apply attacks and crack the system to check the security strength and getting paid for that. 


Myth #2

Security means install antivirus and security products

Security is not about just the product or implementation of antivirus and firewalls. Security is a process which needs to be trade constantly. Imagine if you have implemented best CCTV camera in your organisation but no one is there to monitor it. You cant take immediate actions on any incident. Imagine if you have install best antivirus but how it will be effective unless you will not update it ? You always need to monitor your security process and keep improving to maintain and avoid threats. 

Myth #3

Getting certification of information security or hacking gives you job

Learn to get knowledge not just for JOB. Numerous academics, private organisations are providing certification for information security and hacking with adding best Tag - 100% job. I don't say all of them are fake but the way of their advertisement attract youth and most of them misunderstand the field and get astray. Learning maths will help you to become accountant but not guarantees job. Learning language can help to better communicate but there is not guarantee to make you poet or author. Certifications and training are helpful for your basic understanding to become aware of the topic. Real scenario is different where it is not sufficient to get only certificate and enter into the field. You have to become lifelong learner in this field. 

Myth #4

It will not affect me cause I am not doing anything wrong or risky

Image result for technology student

Really? Are you using net banking? are you working with mail ? are you using ATM ? are you dealing with online accounts? or even using normal social media account ? or not using smartphone ?In all these case I would like to say that you may be victim anytime anywhere especially if you are not tech savvy or unknown about the threats. You may become soft target of cyber criminal. No matter at which field you are working, if you have any touch of technology then security must be your prior requirement. 

Myth #5

My social media account is safe because there are friends only

Social media services, such as Facebook,Twitter, brought so many people online in the last years that it is difficult to find someone who doesn’t have at least a single online account, at least LinkedIn (which is focused mainly on jobs, but has recently started to develop into a more interactive network).online criminals have already developed tricks and methods that target these networks, especially with online scams and identity theft attempts.


These criminals can place malicious content like drive-by downloads and pop-up ads on safe websites, they can do the same with social media accounts. We all had that friend in the list that clicked an offer on a fake page spreading it after to the entire list of friends. fake profile is another threat which may made for collecting information from you by masking your friend's or crush's fake ID. 


So now onward, get overcome your beliefs and stay aware and follow safe security practice no matter what and where you are.


"Stay aware stay safe"

          

Comments

Post a Comment

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત