(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

Brute Force Attacks
Let’s say that a robber wants to break into your home. He will try to go through a door, but he might not have the keys required to get in. In this case, he will have to use everything at his disposal to get in. He might try to kick the door down or smash a window. In other words, he’s getting into your house by brute force.

Brute force in computing can consist of a hacker trying to use as many passwords as possible in a short period of time to get in. There are programs that can randomly generate countless passwords in seconds, making this method of attack quite devastating when it’s effective.

Social Engineering
Let’s say that you have a new neighbor on your street. They ask you over for dinner and you get to know them. You feel like you are getting along with them quite well--well enough to trust them to water your plants while you’re out of the state on vacation for a few weeks. You give them a key, but when you come home, all of the plants are dead and you’re missing some furniture or technology. Yup, they’ve robbed you--you’re sure of it.

Social engineering takes a calculated approach to hacking and data theft. Hackers will make personalized attempts to steal your passwords and information by taking on the identity of someone you think you can trust with this information, like an “old friend” or “your elderly grandmother.”

Security Exploits
Robbers may try to find weak points in your front door. Maybe the door doesn’t quite lock all the way due to a defect in the manufacturing process. In this case, the robber may research what the weak points of the door are so that they can know the best and most efficient way of getting past your defenses.

Security exploits are weaknesses in software on your computer that allow hackers to sneak into your system and get into all sorts of trouble. These can range from weaknesses in the way that sensitive information is handled, to particular lines of code that create problems for your organization. Ultimately, it only takes a single crack in your defenses--a security exploit--to allow a hacker into your infrastructure.

Trojan Horse
Someone might knock on your door and tell you that something within your household is in need of repair. Maybe they know that you have a leaky faucet that needs to be addressed, or they know that you have some concerns about your furnace. They are then invited into your home and go about their business. You may then notice that you’re missing important items afterward, hinting that the off-the-street good Samaritan was, in reality, a scammer.

Trojans work like this in many ways. Just like the Greek horse of old, a Trojan sneaks onto your system and plants a backdoor, allowing for secret re-entry at a later date. Often times, a Trojan will use a larger data breach to mask its presence, and then continue to steal information in small doses as time goes on.

Two-Factor Authentication
Two locks are better than one in most circumstances. For example, you can have one lock on the doorknob and another on the deadbolt, which keeps the door fastened in place even if the door is forced open near the doorknob. Basically, having two types of locks makes it twice as hard to get to anything of value.

Two-factor authentication can be used to provide this secondary credential to your digital assets, including online accounts or network logins. A secondary code can be sent to an email address or mobile device, which allows your employees to access important information only when both of these are present.

Does your organization need help with network security? NTConnections can help. To learn more, reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Mobile Devices Efficiency IT Support Business VoIP Managed Service Provider Email Miscellaneous IT Services Server Disaster Recovery Business Continuity Workplace Tips Upgrade Innovation Network Data Windows Hardware Business Management Software Save Money Saving Money Communication Computer Network Security Mobile Device Management Android Smartphones Holiday communications Managed IT Services Browser Smartphone Microsoft Office Virtualization User Tips Windows 10 WiFi Outsourced IT BYOD Small Business Computers Data Backup Social Media Hacking Chrome Operating System Mobile Computing IT Solutions Alert Apple Proactive IT Cybercrime Remote Monitoring Avoiding Downtime Application Automation The Internet of Things Quick Tips Office Managed IT Services Ransomware Budget Collaboration Information Technology Social Engineering Big Data Passwords Employer-Employee Relationship Marketing Remote Computing Gadgets Mobility Health Recovery Bring Your Own Device VPN Telephone Systems Data Recovery spam Going Green Firewall How To Managed IT Vendor Management Bandwidth Cloud Computing Two-factor Authentication Compliance iPhone Wireless Technology User Error Cybersecurity App BDR Save Time History Tablet Mouse Value Redundancy Vulnerability Retail Memory Risk Management Search Office 365 IT Support Internet of Things Networking Antivirus Windows 10 Office Tips Analytics Router Gmail Lithium-ion battery PowerPoint Website Artificial Intelligence Excel Phone System Content Filtering Money Downtime Private Cloud Administration SaaS Apps Unsupported Software IT Consultant Phishing Entertainment Safety Government Running Cable Skype Meetings Saving Time Unified Threat Management Document Management HaaS Fax Server Identity Theft Data Security Mobile Office Black Market Online Currency Customer Relationship Management Data Management Law Enforcement Credit Cards Best Available Solid State Drive Printer People Programming Internet Exlporer Network Congestion Data storage Trending Biometrics Current Events Workers Maintenance Data Storage Business Owner Hard Drives Word Humor OneNote Business Intelligence Statistics Facebook Intranet Work/Life Balance Outlook Physical Security DDoS IT Management Robot Google Drive Environment Flexibility Public Cloud Charger Relocation Virtual Reality Software as a Service Uninterrupted Power Supply Training Telecommuting Hybrid Cloud Domains Cables Sync Hiring/Firing Computer Care IaaS Bloatware Update WIndows 7 Remote Work Software Tips HIPAA Cleaning Customer Service Unified Communications Telephony Spam Blocking Entrepreneur Google Docs Company Culture Managing Stress Windows 8.1 Update Keyboard Tech Support LinkedIn Theft Hacker Start Menu Virus Audit Cost Management Voice over Internet Protocol HBO Debate Shadow IT Wireless Cortana Science Mobile Computer Accessories Computer Fan Screen Mirroring Applications Streaming Media Instant Messaging Multi-Factor Security Files Shortcut Fraud Frequently Asked Questions Productivity Video Surveillance Password SharePoint Google Apps Windows 8 Professional Services Cameras FENG Print Server Consultant Cast Wi-Fi Encryption Lifestyle Colocation Amazon Bluetooth Tip of the week Education Sports Monitor eWaste Infrastructure Tablets Tools Printer Server Computer Repair Notifications Data Protection Net Neutrality Computing Infrastructure Amazon Web Services USB Windows Server 2008 Worker Commute Piracy Hosted Solution YouTube Reputation Wearable Technology Password Manager User Social Comparison End of Support Online Shopping Windows 7 Licensing NarrowBand Customers Samsung Mobile Device Botnet Touchscreen Data Warehousing Twitter Best Practice Social Networking Specifications Internet exploMicrosoft Evernote Regulations Chromecast Crowdfunding Analyitcs Travel Root Cause Analysis Millennials Advertising Settings Wireless Charging Servers Patch Management Laptop Distributed Denial of Service Data loss IT Plan Virtual Desktop Workforce IT service Fiber-Optic Human Resources Flash Windows Media Player Scam Touchpad Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Smart Technology Windows 10s Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Electronic Medical Records Techology Public Computer Users Employer Employee Relationship Legal Data Breach Automobile Emails Books Business Mangement CrashOverride IBM Webinar Emergency Worker Recycling Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix