Friday, February 8, 2019

One stop RACI Categories Definitions


Responsible: person who performs an activity or does the work.
Accountable: person who is ultimately accountable and has Yes/No/Veto.
Consulted: person that needs to feedback and contribute to the activity.
Informed: person that needs to know of the decision or action.

Thursday, January 24, 2019

Most commonly used methods of Cyber-Attack


1. Spear-phishing attack: By email to install malware
2. Zero-day Exploits: Security hole unknown to vendor during product release.
3. Customized Malware: Malicious software that avoids the detection by traditional security technologies
4. Drive-by-Download: Infects the computer while visiting website running malicious code
5. Social Engineering: By manipulating people

Privileged Account Management- What is a Targeted Cyber Attacks


Any cyber-attack carried out for stealing information or business disruption that satisfies the following criterion:
  1. Specific target (organization or person)
  2. Persistent (coordinated effort by Hacker)
  3. Considerable Effort

Privileged Account Management- Mitigate Insider Threat


How to mitigate Insider Threat

  1. Practice Least Privileged Access principle.
  2. Secure privilege accounts.
  3. Apply Segregation of Duties principle.
  4. Educate Users
  5. Monitor and Audit Usage

Privileged Account Management- Insider Threat


What is Insider Threat

An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates. The insider threat can  be categorized as:
  1. Malicious Insider: A user with a malicious intent
  2. Unintentional Insider: Stupid user, falling victim to phishing emails.
  3. Exploited Insider: Exploiting high value users, spear phishing.
  4. External Insider: Third party vendor, partner or contractor.

Privileged Account Management- Privileged Accounts Usage


Privileged Accounts Usage:

  1. Access sensitive data
  2. Change system configuration
  3. Install Software
  4. Access and change account


Privileged Account Management- Types of Privileged Account


Types of Privileged Account

  1. Elevated personal user account: Used by an end user with elevated/unrestricted  access, like IT admin or executives.
  2. Shared privileged account: Unrestricted access to system to house sensitive data. Unix root account or windows admin, social media account.
  3. Application Account:  Service accounts, This is used by applications to interact with each other.

Privileged Account Management- Types of User Account

Types of User Account

  1. Regular user account: Identified by username, password and privilege, used by regular end user
  2. Super User account: A special user account that can make system wide changes for all users.
  3. Application account: This is used by applications to interact with each other without user interactive login procedure, typically stored in applications or data files.
  4. Service Accounts: A service account is a special user account that an application or service uses to interact with the operating system