{"id":61,"date":"2010-05-20T01:26:47","date_gmt":"2010-05-20T01:26:47","guid":{"rendered":"http:\/\/www.technogypsie.com\/science\/?p=61"},"modified":"2010-05-20T01:26:47","modified_gmt":"2010-05-20T01:26:47","slug":"security-information-technology","status":"publish","type":"post","link":"https:\/\/technotink.net\/science\/security-information-technology\/","title":{"rendered":"Security+ Fundamentals and Mitigating Threats"},"content":{"rendered":"<p><strong>Security+: Security Fundamentals, Mitigating Threats<\/strong><br \/>\nComputers and Networks possess vulnerabilities and mitigations associated with network devices, including privelege escalation and weak passowrds. There are many things the industry is doing to tackle these weak links in order to &#8216;harden&#8217; their security protocols, rules, and access. The industry has come up with best practices for access control to implicit deny, give least privilege, separation of duties for staff members, and job rotation to keep the system sharp. This is often regulated withe the MAC &#8211; Mandatory Access Control, (DAC) Discretionary Access Control, and Role\/Rule based Access Control systems. When access is implemented, there are methods to prove identification, authentication, confidentiality, integrity, while keeping availability by the use of cryptography and encryption. Security groups and protocols are implemented as well as components such as Kerberos, Mutual, and Biometric Readers. But even these methodologies have its vulnerabilities and weaknesses. Crytography, Hashing, and Algorithms are utilized in encryption to create strong-hold applications in protecting data, password, communication, and access. Computer Security begins with Security Building Blocks often acronymed &#8220;The CIA Triad&#8221; that represents three important principles &#8230; confidentiality, integrity, and availability while maintaining non-repudiation and keeping the transmitted data associated with the original data that was created. This is all embraced in order to protect from threats that could involve unintentional or unauthorized access or changes to data, interruption of services, interruption of access to assets, damage to hardware, or unauthorized access and damage to facilities. Many of these vulnerabilities are caused by simple reasons like improperly configured or installed hardware\/software, bugs in software\/operating systems, misuse of software\/communication protocols, poorly designed networks, poor physical security, insecure passwords, design flaws in software\/operating systems, and unchecked user input. Exposure to risks can cause great financial damage or loss, and is often caused by the user. Security relies on the Four A&#8217;s: Authentication, Authorization, Access Control, Auditing or Accounting. It has become commonplace with I.T. Networks to grant users minimal priveleges since User error is the biggest risk that exists. Not giving an Employee too much authority or too many duties, incorporating job rotation, insisting on mandatory vacations, and having protocols of privilege management covers most bases in security threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security+: Security Fundamentals, Mitigating Threats Computers and Networks possess vulnerabilities and mitigations associated with network devices, including privelege escalation and weak passowrds. There are many things the industry is doing to tackle these weak links in order to &#8216;harden&#8217; their &hellip; <a href=\"https:\/\/technotink.net\/science\/security-information-technology\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[25,47],"tags":[],"class_list":["post-61","post","type-post","status-publish","format-standard","hentry","category-computer-science","category-information-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security+ Fundamentals and Mitigating Threats - Naturally Science and Lore<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/technotink.net\/science\/security-information-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security+ Fundamentals and Mitigating Threats - Naturally Science and Lore\" \/>\n<meta property=\"og:description\" content=\"Security+: Security Fundamentals, Mitigating Threats Computers and Networks possess vulnerabilities and mitigations associated with network devices, including privelege escalation and weak passowrds. There are many things the industry is doing to tackle these weak links in order to &#8216;harden&#8217; their &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/technotink.net\/science\/security-information-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Naturally Science and Lore\" \/>\n<meta property=\"article:published_time\" content=\"2010-05-20T01:26:47+00:00\" \/>\n<meta name=\"author\" content=\"technotink\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"technotink\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-information-technology\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-information-technology\\\/\"},\"author\":{\"name\":\"technotink\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/#\\\/schema\\\/person\\\/7d9cbe7291739e15ff8d989e506857fd\"},\"headline\":\"Security+ Fundamentals and Mitigating Threats\",\"datePublished\":\"2010-05-20T01:26:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-information-technology\\\/\"},\"wordCount\":373,\"commentCount\":1,\"articleSection\":[\"Computer Science\",\"Information Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/technotink.net\\\/science\\\/security-information-technology\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-information-technology\\\/\",\"url\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-information-technology\\\/\",\"name\":\"Security+ Fundamentals and Mitigating Threats - Naturally Science and Lore\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/#website\"},\"datePublished\":\"2010-05-20T01:26:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/#\\\/schema\\\/person\\\/7d9cbe7291739e15ff8d989e506857fd\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-information-technology\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/technotink.net\\\/science\\\/security-information-technology\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-information-technology\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/technotink.net\\\/science\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security+ Fundamentals and Mitigating Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/#website\",\"url\":\"https:\\\/\\\/technotink.net\\\/science\\\/\",\"name\":\"Naturally Science and Lore\",\"description\":\"Science, Natural Wonders and Lore\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/technotink.net\\\/science\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/#\\\/schema\\\/person\\\/7d9cbe7291739e15ff8d989e506857fd\",\"name\":\"technotink\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g\",\"caption\":\"technotink\"},\"url\":\"https:\\\/\\\/technotink.net\\\/science\\\/author\\\/technotink\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security+ Fundamentals and Mitigating Threats - Naturally Science and Lore","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/technotink.net\/science\/security-information-technology\/","og_locale":"en_US","og_type":"article","og_title":"Security+ Fundamentals and Mitigating Threats - Naturally Science and Lore","og_description":"Security+: Security Fundamentals, Mitigating Threats Computers and Networks possess vulnerabilities and mitigations associated with network devices, including privelege escalation and weak passowrds. There are many things the industry is doing to tackle these weak links in order to &#8216;harden&#8217; their &hellip; Continue reading &rarr;","og_url":"https:\/\/technotink.net\/science\/security-information-technology\/","og_site_name":"Naturally Science and Lore","article_published_time":"2010-05-20T01:26:47+00:00","author":"technotink","twitter_card":"summary_large_image","twitter_misc":{"Written by":"technotink","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/technotink.net\/science\/security-information-technology\/#article","isPartOf":{"@id":"https:\/\/technotink.net\/science\/security-information-technology\/"},"author":{"name":"technotink","@id":"https:\/\/technotink.net\/science\/#\/schema\/person\/7d9cbe7291739e15ff8d989e506857fd"},"headline":"Security+ Fundamentals and Mitigating Threats","datePublished":"2010-05-20T01:26:47+00:00","mainEntityOfPage":{"@id":"https:\/\/technotink.net\/science\/security-information-technology\/"},"wordCount":373,"commentCount":1,"articleSection":["Computer Science","Information Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/technotink.net\/science\/security-information-technology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/technotink.net\/science\/security-information-technology\/","url":"https:\/\/technotink.net\/science\/security-information-technology\/","name":"Security+ Fundamentals and Mitigating Threats - Naturally Science and Lore","isPartOf":{"@id":"https:\/\/technotink.net\/science\/#website"},"datePublished":"2010-05-20T01:26:47+00:00","author":{"@id":"https:\/\/technotink.net\/science\/#\/schema\/person\/7d9cbe7291739e15ff8d989e506857fd"},"breadcrumb":{"@id":"https:\/\/technotink.net\/science\/security-information-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/technotink.net\/science\/security-information-technology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/technotink.net\/science\/security-information-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/technotink.net\/science\/"},{"@type":"ListItem","position":2,"name":"Security+ Fundamentals and Mitigating Threats"}]},{"@type":"WebSite","@id":"https:\/\/technotink.net\/science\/#website","url":"https:\/\/technotink.net\/science\/","name":"Naturally Science and Lore","description":"Science, Natural Wonders and Lore","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/technotink.net\/science\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/technotink.net\/science\/#\/schema\/person\/7d9cbe7291739e15ff8d989e506857fd","name":"technotink","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g","caption":"technotink"},"url":"https:\/\/technotink.net\/science\/author\/technotink\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/posts\/61","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/comments?post=61"}],"version-history":[{"count":0,"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/posts\/61\/revisions"}],"wp:attachment":[{"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/media?parent=61"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/categories?post=61"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/tags?post=61"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}