NEW CARDING CHAT IN TELEGRAM

A three-step approach to information security

Man

Professional
Messages
2,828
Reputation
5
Reaction score
447
Points
83
Today we will consider one of the models of building a security system with examples.

Stage 1: Understand your infrastructure.

At this stage, you need to understand local networks, devices, and software, what exactly you will be protecting.

There are 5 key questions here:
1. What information needs to be protected? Where in the system is the most sensitive data located?
2. What devices are involved in the work?
3. What software is used?
4. Are strong passwords used?
5. What resources on the Internet do employees interact with? Do they visit social networks in the workplace?

Let's reveal.
To protect your business, you need to understand the value of data, as well as how it can be used by attackers.

Here are examples of data that is critical:
• Card data, bank documents, financial information and accounting;
• Personal data of employees
• Other trade secrets of the organization.

What devices are involved in the work? Is parallelism observed: is the work device not used for personal purposes?

Knowing what devices are used helps you manage your organization more successfully. You understand what exactly needs to be protected. Keep track of your equipment and create a list of protected information: computers, phones, bank and SIM cards, modems and routers. Create a spreadsheet and update it regularly when new equipment and data appear or when they are lost/failed. If there is a local network, instruct the system administrator to use Nmap, ZenMap - these are network scanners that allow you to determine which devices are connected to the network - as well as software for managing devices and installed software on your network.

Create a plan for regular checks and updates of the software you use. Try to use open source software to avoid problems with software backdoors that allow forensic experts to access your data. The same applies to devices - no MacBooks, iPhones or Huaweis. We will talk about the choice of specific devices in future posts.

Step 2 Protect Assets
Technical solutions are not enough to protect information. Conduct seminars where you will talk about how to behave when the guys in uniform come and how to behave so as not to infect devices. Create a document on what is allowed and what is not allowed in the workplace, and make sure that employees adhere to it. Use two- or multi-factor authentication wherever possible.

Tokens, smart cards and SMS are your best friends.

- Understand which employees in your organization have access to sensitive information and make sure they understand their role and are aware of basic digital hygiene and information security practices.
- Make sure employees can spot the key signs of a phishing attack; for example, someone asking for valuable information in a hurry or asking to ignore security procedures.

If an employee understands that something is strange, suspicious, or sounds too good to be true, they are prepared to fend off these types of attacks.

Step 3 Prepare the Organization
Once you have developed an information security model, you need to think about attack or incident response scenarios. This means understanding how to respond to a particular security situation and how to recover quickly from it. Determine what specific information is important to you in the event of an attack and encrypt it in a crypto-container, moving it to a storage device such as a flash drive. You can put the flash drive in a safe deposit box or give it to trusted people. Make copies if necessary.
 
Top