Working in the field of cybersecurity, Wayne Nordstrom wears many hats. He is a network engineer, a network security architect, and a Linux security engineer. One of the roles that Wayne Nordstrom fulfills is that of an ethical hacker.
Tuesday, December 29, 2020
Ethical Hackers
Tuesday, December 8, 2020
Cloud Jacking and Multifactor Authentication Defenses
Driven by the reliance on cloud computing, cloud jacking typically involves misconfiguration and is conducted via code injection. Such attacks can be introduced directly into the cloud platform’s code through SQL injection or third-party libraries using cross-site scripting. When users unknowingly download and execute the maliciously injected code, hackers are given various levels of control, including eavesdropping and the modification of sensitive data and files that have been placed in cloud storage.
One cloud-jacking safeguard that companies should take is multifactor authentication (MFA), which goes beyond simple passwords/PINs to require an additional factor, such as token, device, fingerprint, or facial scan. Companies are also setting up MFA with continuous authentication, which helps ensure that the same person who was first authenticated and identified at the gate continues to be the person using the system.
Tuesday, November 17, 2020
What is Penetration Testing?
Penetration testing, also known as a pen test, is a security drill where cybersecurity experts simulate a cyberattack in order to identify and exploit system vulnerabilities. The aim of a simulated attack is to point out weak areas in a system that attackers could capitalize on so that businesses proactively address them in good time before hackers attack. Previously, it was difficult for hackers to penetrate systems as it required a lot of time and skill but technological advances have, in recent times, made it simpler for intruders to compromise systems.
Penetration testing varies from one organization to another depending on what needs to be assessed during the security exercise. This test often includes all major components of a system including networks, physical security modules, applications, and devices.
To achieve the best results, penetration testing should be done by someone who doesn’t have prior knowledge of system security configurations, preferably ethical hackers. These are external contractors hired and authorized by a company to hack into their system as part of efforts to boost system security. They possess excellent technical skills that make them best placed to discover areas that system developers could have missed out when they were developing the system.
Thursday, October 15, 2020
Microsoft's System Center Configuration Manager - IT Applications
Microsoft System Center component products are available as bundled suites, and each requires a separate license. Microsoft System Center Management Licenses provide users with permission to install and execute management server components. Management Licenses (MLs), in accordance with Microsoft's licensing terms, allow users to run a product in one operating system environment (OSE) with one server. Among the System Center products are System Center Configuration Manager SCCM, System Center Virtual Machine Manager SCVMM, System Center Service Manager SCSM, and Data Protection Manager DPM.
A client-focused tool, SCCM enables the centralization of administrative actions such as software updating and deployment in a scalable and secure manner. The product provides real-time actions on-premises on internet-based devices (including desktops and laptops) with the aid of cloud-powered analytics. It also enables the review and management of compliance settings.