(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

Brute Force Attacks
Let’s say that a robber wants to break into your home. He will try to go through a door, but he might not have the keys required to get in. In this case, he will have to use everything at his disposal to get in. He might try to kick the door down or smash a window. In other words, he’s getting into your house by brute force.

Brute force in computing can consist of a hacker trying to use as many passwords as possible in a short period of time to get in. There are programs that can randomly generate countless passwords in seconds, making this method of attack quite devastating when it’s effective.

Social Engineering
Let’s say that you have a new neighbor on your street. They ask you over for dinner and you get to know them. You feel like you are getting along with them quite well--well enough to trust them to water your plants while you’re out of the state on vacation for a few weeks. You give them a key, but when you come home, all of the plants are dead and you’re missing some furniture or technology. Yup, they’ve robbed you--you’re sure of it.

Social engineering takes a calculated approach to hacking and data theft. Hackers will make personalized attempts to steal your passwords and information by taking on the identity of someone you think you can trust with this information, like an “old friend” or “your elderly grandmother.”

Security Exploits
Robbers may try to find weak points in your front door. Maybe the door doesn’t quite lock all the way due to a defect in the manufacturing process. In this case, the robber may research what the weak points of the door are so that they can know the best and most efficient way of getting past your defenses.

Security exploits are weaknesses in software on your computer that allow hackers to sneak into your system and get into all sorts of trouble. These can range from weaknesses in the way that sensitive information is handled, to particular lines of code that create problems for your organization. Ultimately, it only takes a single crack in your defenses--a security exploit--to allow a hacker into your infrastructure.

Trojan Horse
Someone might knock on your door and tell you that something within your household is in need of repair. Maybe they know that you have a leaky faucet that needs to be addressed, or they know that you have some concerns about your furnace. They are then invited into your home and go about their business. You may then notice that you’re missing important items afterward, hinting that the off-the-street good Samaritan was, in reality, a scammer.

Trojans work like this in many ways. Just like the Greek horse of old, a Trojan sneaks onto your system and plants a backdoor, allowing for secret re-entry at a later date. Often times, a Trojan will use a larger data breach to mask its presence, and then continue to steal information in small doses as time goes on.

Two-Factor Authentication
Two locks are better than one in most circumstances. For example, you can have one lock on the doorknob and another on the deadbolt, which keeps the door fastened in place even if the door is forced open near the doorknob. Basically, having two types of locks makes it twice as hard to get to anything of value.

Two-factor authentication can be used to provide this secondary credential to your digital assets, including online accounts or network logins. A secondary code can be sent to an email address or mobile device, which allows your employees to access important information only when both of these are present.

Does your organization need help with network security? NTConnections can help. To learn more, reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 24 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Mobile Devices Google Efficiency VoIP Business IT Support IT Services Email Miscellaneous Network Security Managed Service Provider Innovation Server Workplace Tips Disaster Recovery Business Continuity Network Data Software Windows Upgrade Business Management Hardware Mobile Device Management Communication Virtualization Computer Browser Smartphone Save Money Saving Money Android Managed IT Services Smartphones User Tips Microsoft Office communications Data Backup Holiday Windows 10 BYOD WiFi Computers Cybercrime Outsourced IT Small Business Cloud Computing Social Media Remote Monitoring Operating System Ransomware Mobile Computing Hacking Chrome Big Data Application Alert Apple Data Recovery Proactive IT Avoiding Downtime Managed IT Services VPN IT Solutions Employer-Employee Relationship Quick Tips Automation Information Technology Internet of Things Office Passwords Budget Collaboration Marketing Social Engineering The Internet of Things spam Gadgets Mobility Recovery Health Going Green Remote Computing Bring Your Own Device Telephone Systems Cybersecurity BDR Vendor Management Private Cloud Save Time Firewall iPhone How To Redundancy Managed IT Bandwidth Two-factor Authentication IT Support Compliance Vulnerability Data Security Wireless Technology User Error App Data Protection Gmail Business Intelligence Phone System Content Filtering Money Downtime Tech Term Antivirus Phishing History Mouse Tablet Value Retail Memory Search Analytics Router Office 365 Data Management Networking Identity Theft Artificial Intelligence Windows 10 Office Tips Apps PowerPoint Lithium-ion battery Website Document Management Excel Risk Management Online Currency Google Drive Flexibility Environment Data loss Public Cloud Printer Human Resources SaaS Administration IT Management Training Safety Entertainment Current Events Government Running Cable IT Plan HIPAA Cleaning Unified Threat Management Maintenance Meetings Skype HaaS CES Fax Server Unsupported Software Mobile Office Black Market Customer Relationship Management Update Law Enforcement Solid State Drive Best Available Intranet People Programming Internet Exlporer Data storage Network Congestion Productivity Encryption Biometrics Trending Credit Cards Workers eWaste Business Owner Humor Hard Drives OneNote IT Consultant Statistics Facebook Mobile Device Data Storage Work/Life Balance Saving Time Physical Security DDoS Outlook Word Comparison Robot Advertising Settings Online Shopping Windows 7 Patch Management Laptop Distributed Denial of Service Business Mangement Botnet Specifications Data Warehousing Virtual Desktop Windows Media Player IT service Evernote Regulations Scam Touchpad Charger Relocation Virtual Reality Recycling Travel IoT Millennials Uninterrupted Power Supply Hybrid Cloud Print Server Domains Hiring/Firing Wireless Charging Servers Computer Care WIndows 7 IaaS Bloatware Criminal Customer Service Smart Tech Workforce PDF Fiber-Optic Spam Blocking Flash Software as a Service Net Neutrality Managing Stress Computer Repair Entrepreneur Insurance Telecommuting Keyboard Tech Support Virus Hacker Cables LinkedIn Sync Cost Management Content Management Practices Debate Remote Work Software Tips Shadow IT Computer Accessories Wireless Science Unified Communications Computer Fan Telephony Google Docs Touchscreen Applications Streaming Media Instant Messaging Blockchain Shortcut Hosted Computing Files Password Cameras SharePoint Windows 8 Theft FENG Video Surveillance Start Menu Voice over Internet Protocol Audit Wi-Fi Consultant Staff Inventory Education Bluetooth HBO Sports Colocation Monitor Printer Server Tablets Cortana Mobile Electronic Medical Records Multi-Factor Security Screen Mirroring Notifications Digital Signature Access Control Piracy USB Fraud Frequently Asked Questions Hosted Solution YouTube Computing Infrastructure Worker Commute Reputation Legal Wearable Technology Google Apps Professional Services Lifestyle Cast User Social Strategy Authentication Licensing Amazon Tip of the week NarrowBand End of Support Customers Infrastructure Samsung Tools Best Practice Twitter Social Networking Analysis Amazon Web Services Windows Server 2008 Chromecast Internet exploMicrosoft Company Culture Analyitcs Password Manager Root Cause Analysis Crowdfunding Windows 8.1 Update Accountants IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Users Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Nanotechnology Webinar Emergency Worker Supercomputer Content