IT Security: Defense against the Digital Dark Arts
It has 6 sub-modules about different security related topics and a 7th project module.
It has 6 sub-modules about different security related topics and a 7th project module.
The CIA Triad consists of:
Keeping things hidden.
Keeping our data accurate and untampered with.
The Information we have is readily accessible to those people that should have it.
The possibility of suffering a loss in the event of an attack on the system.
A flaw in a system that could be exploited to compromise the system.
A vulnerability that is not known to the software developer or vendor, but is known to an attacker.
Software that is used to take advantage of a security bug or vulnerability.
The possibility of danger that could exploit a vulnerability.
Someone who attempts to break into or exploit a system.
An actual attempt at causing harm to a system.
A type of malicious software that can be used to obtain your sensitive information, or delete or modify files.
Software that displays advertisements and collects data.
Malware that disguises itself as one thing but does something else.
A type of malware that’s meant to spy on you.
A common type of spyware that’s used to record every keystroke you make.
“A type of attack that holds your data or system hostage until you pay some sort of ransom.”
If the computer has one or more of the following symptoms, it may be infected with malware:
After you’ve gathered information, verify that the issues are still occurring by monitoring the computer for a period of time. One way to monitor and verify is to review the activity on the computer’s resource manager, where you can see open processes running on a system.
When looking at the resource manager, you might see a program with a name you do not recognize, a program that is using a lot of memory, or both. If you see a suspicious program, you should investigate this application by asking the user if it is familiar to them.
Some malware communicates with bad actors or sends out sensitive information. Other malware is designed to take part in a distributed botnet. A botnet is a number of Internet-connected devices, each of which runs one or more bots. Because of malware’s potential ability to communicate with other bad actors, you should quarantine the infected device.
To quarantine, or separate, the infected device from the rest of the network, you should disconnect from the internet by turning off Wi-Fi and unplugging the Ethernet cable. Once the computer is disconnected, the malware can no longer spread to other computers on the network.
You should also disable any automatic system backup. Some malware can reinfect a computer by using automatic backup, because you can restore the system with files infected by the malware.
Once you have confirmed and isolated the malware on a device, you should attempt to remove the malware from the device. First, run an offline malware scan. This scan helps find and remove the malware while the computer is still disconnected from the local network and internet.
All antivirus/anti-malware programs rely on threat definition files to identify a virus or malware. These files are often updated automatically, but in the case of an infected computer they may be incomplete or unable to update. In this case, you may need to briefly connect to the internet to confirm that your malware program is fully updated.
The scan should successfully identify, quarantine, and remove the malware on the computer. Once the process is complete, monitor the computer again to confirm that there are no further issues.
To help ensure that a malware infection doesn’t happen again, threat definitions should be set to update automatically, and to automatically scan for and quarantine suspected malware.
After the malware has been removed from the computer, you should turn back on the automatic backup tool and manually create a safe restore point. If the computer needs attention in the future, this new restore point is confirmed safe and clean.
One of the most important things an IT professional can do to protect a company and its employees is to educate users about malware. The goal of education is to stop malware from ever gaining access to company systems. Here are a few ways users and IT professionals can protect their computer and the company from malware:
When all employees are on the lookout for suspicious files, it’s much easier to prevent malware and viruses from taking hold.
Designed to utilize the power of the internet-connected machines to perform some distributed function.
A way to get into a system if the other methods to get in the system aren’t allowed.
A collection of software or tools that an Admin would use.
A type of malware that’s intentionally installed.
Disgruntled worker ’tried to cripple UBS in protest over $32,000 bonus’
A network attack that is simple in concept, but can cause a lot of damage is:
It works by tricking the DNS server to serve, fake DNS request.
Major DNS Cache Poisoning Attack Hits Brazilian ISPs
Man-in-the-middle attack is an attack that places the attacker in the middle of two hosts that think they’re communicating directly with each other.
The methods of Man-in-the-middle attack are:
An access point that is installed on the network without the network administrator’s knowledge.
The premise of an evil twin attack is for you to connect to a network that is identical to yours. This identical network is our network’s evil twin and is controlled by our attacker.
An attack that tries to prevent access to a service for legitimate users by overwhelming the network or server.
In a SYN flood, the server is being bombarded with SYN packets.
During SYN flood, the TCP connection remains open, so it is also called a Half-open attack.
A DoS attack using multiple systems.
How to Stop DDoS Attacks: Prevention & Response
What is a DDOS Attack & How to Protect Your Site Against One
DDoS Protection, Mitigation, and Defense: 8 Essential Tips
A type of injection attack where the attacker can insert malicious code and target the user of the service.
Utilize software like password-crackers that try and guess your password.
A Catchpa, can save your website from brute force attack.
An attack method that relies heavily on interactions with humans instead of computers.
The popular types of social engineering attacks:
A source masquerading around as something else.
Gaining access into a restricted area or building by following a real employee in.
The cryptography has two main fields:
The act of taking a message, called plaintext, and applying an operation to it, called a cipher, so that you receive a garbled, unreadable message as the output, called ciphertext.
The reverse is Decryption.
The Cipher is made up of two components:
The underlying logic of the process that’s used to convert the plaintext into ciphertext.
These algorithms are usually very complex. But there are also simple algorithms as well.
Security through obscurity is a principle where underlying encryption algorithm is also kept hidden for security purposes. But you shouldn’t rely on it, as once the underlying mechanism is discovered, your whole security will wash away.
The underlying principle of cryptography is called Kirchhoff’s principle.
A collection of algorithms for key generation and encryption and decryption operations that comprise a cryptographic service should remain secure – even if everything about the system is known, except the key.
The practice of studying the frequency with which letters appear in a ciphertext.
An Arab mathematician of 9th century, used this first cryptographic method
The practice of hiding the information from observers, but not encoding it.
Requires access to some or all the of the plaintext of the encrypted information. The plaintext is not computationally tagged, specially formatted, or written in code. The analyst’s goal is to examine the known plaintext to determine the key used to encrypt the message. Then they use the key to decrypt the encoded information.
Requires that the attacker knows the encryption algorithm or has access to the device used to do the encryption. The analyst can encrypt one block of chosen plaintext with the targeted algorithm to get information about the key. Once the analyst obtains the key, they can decrypt and use sensitive information.
Requires access to one or more encrypted messages. No information is needed about the plaintext data, the algorithm, or data about the cryptographic key. Intelligence agencies face this challenge when intercepting encrypted communications with no key.
ACPA is similar to a chosen-plaintext attack. Unlike a CPA, it can use smaller lines of plaintext to receive its encrypted ciphertext and then crack the encryption code using the ciphertext.
MITM uses cryptanalysts to insert a meddler between two communication devices or applications to exchange their keys for secure communication. The meddler replies as the user, and then performs a key exchange with each party. The users or systems think they communicate with each other, not the meddler. These attacks allow the meddler to obtain login credentials and other sensitive information.
Wikipedia article on Cryptanalysis Integer Factorization Cryptanalysis explained
These types of algorithms use the same key for encryption and decryption.
An encryption mechanism that replaces parts of your plaintext with ciphertext.
Takes a stream of input and encrypts the stream one character or one digit at a time, outputting one encrypted character or digit at a time.
The cipher takes data in, places it into a bucket or block of data that’s a fixed size, then encodes that entire block as one unit.
One of the earliest standard is Data Encryption Standard (DES).
Federal Information Processing Standard.
NIST (National Institute of Standards and Technology), adopted Advanced Encryption Standard (AES) in 2001.
An important thing to keep in mind when considering various encryption algorithms is speed, and ease of implementation.
A symmetric stream cipher that gained widespread adoption because of its simplicity and speed.
Asymmetric or Public Key ciphers.
Two different keys are used for encryption and decryption.
The three concepts that an asymmetric cryptosystem grants us are:
Symmetric encryption is used for key exchange.
A bit of information that allows authentication of a received message, ensuring that the message came from the alleged sender and not a third party.
Keyed-hash messaged authentication code.
Cipher-Based Message Authentication Codes.
Cipher block chaining message authentication codes.
The first practical asymmetric cryptography systems to be developed is RSA.
Pretty complex math is involved in generating key pair for RSAs.
This crypto system was patented in 1983 and was released to the public domain by RSA Security in the year 2000.
It was patented in 1991, and is part of the US government’s Federal Information Processing Standard.
Similar to RSA, the specification covers the key generation process along with the signing and verifying data using the key pairs. It’s important to call out that the security of this system is dependent on choosing a random seed value that’s incorporated into the signing process. If this value was leaked or if it can be inferred if the prime number isn’t truly random, then it’s possible for an attacker to recover the private key.
Named after coworkers, invented it. It is solely used for key exchange.
Let’s assume we have two people who would like to communicate over an unsecured channel, and let’s call them Suzanne and Daryll. First, Suzanne and Daryl agree on the starting number that would be random and will be a very large integer. This number should be different for every session and doesn’t need to be secret. Next, each person decides another randomized large number, but this one is kept secret. Then, they combine their shared number with their respective secret number and send the resulting mix to each other. Next, each person combines their secret number with the combined value they received from the previous step. The result is a new value that’s the same on both sides, without disclosing enough information to any potential eavesdroppers to figure out the shared secret. This algorithm was designed solely for key exchange, though there have been efforts to adapt it for encryption purposes.
A public-key encryption system that uses the algebraic structure of elliptic curves over finite fields to generate secure keys.
Sony PlayStation 3: An asymmetric encryption attack in 2010
A type of function or operation that takes in an arbitrary data input and maps it to an output of fixed size, called a hash or digest.
Two different inputs mapping to the same output.
Designed in early 1990s. Operates on 512-bits block and generates 128-bits hash digest.
Create a text file
echo 'This is some text in a file' > file.txt
To create an MD5 hash:
md5sum file.txt > file.txt.md5
To verify the hash
md5sum -c file.txt.md5
SHA-1 is part of the Secure Hash Algorithm suite of functions, designed by the NSA, published in 1995.
During the 2000s, a bunch of theoretical attacks against SHA1 were formulated, and some partial collisions were demonstrated.
To create a hash
shasum file.txt > file.txt.sha1
To verify sha1
shasum -c file.txt.sha1
To create SHA256 hash
shasum -a 256 file.txt > file.txt.sha256
For verification, use the same command as above.
The passwords should not be stored in plaintext, instead they should be hashed and, store a hash.
Additional randomized data that’s added into the hashing function to generate a hash that’s unique to the password and salt combination.
PKI is a system that defines the creation, storage, and distribution of digital certificates. A digital certificate is a file that proves that an entity owns a certain public key.
Start from the Root Certificate authority, which signs the certificate itself, as no one above it.
This Root certificate authority can now use the self-signed certificate and the associated private key to begin signing other public keys and issuing certificates.
A certificate that has no authority as a CA is referred to as an end-entity or leaf certificate.
The fields defined in X.509 are:
What version of the X.509 standard the certificate adheres to.
A unique identifier for the certificate assigned by the CA, which allows the CA to manage and identify individual certificates.
This field indicates what public key algorithm is used for the public key and what hashing algorithm is used to sign the certificate.
This field contains information about the authority that signed the certificate.
This contains two subfields – “Not Before” and “Not After” – which define the dates when the certificate is valid for.
This field contains identifying information about the entity the certificate was issued to.
These two subfields define the algorithm of the public key, along with the public key itself.
Same as the Subject Public Key Info field; These two fields must match.
The digital signature data itself.
This is a certificate that a web server presents to a client as part of the initial secure setup of an SSL, TLS connection.
Signed by the same entity that issued the certificate. Signing your own public key using your own with private key.
As the names implies, these are certificates that are bound to clients and are used to authenticate the client to the server, allowing access control to an SSL/TLS service.
This allows users of these signed applications to verify the signatures and ensure that the application was not tampered with.
Individuals are signing each other certificates, after verifying the identity of the persons with agreed upon methods.
The secure version of HTTP, the Hyper Text Transport Protocol.
It grants us three things
To establish a TLS channel, there is a TLS handshake in place.
The session key is the shared symmetric encryption key used in TLS sessions to encrypt data being sent back and forth.
A secure network protocol that uses encryption to allow access to a network service over unsecured networks.
An encryption application that allows authentication of data, along with privacy from third parties, relying upon asymmetric encryption to achieve this.
A mechanism that allows you to remotely connect a host or network to an internal, private network, passing the data over a public channel, like the internet.
There are different VPN protocols:
IPsec support two modes:
It is not an all alone protocol, it is used in conjunction with IPsec protocol.
The tunnel is provided by L2TP, which permits the passing of unmodified packets from one network to another. The secure channel, on the other hand, is provided by IPsec, which provides confidentiality, integrity, and authentication of data being passed.
The combination of L2TP and IPsec is referred to as L2TP/IPsec and was officially standardized in IETF RFC 3193
OpenVPN is an example of LT2p/IPsec.
It uses OpenSSL library to handle key exchange and encryption of data, along with control channels.
OpenVPN can operate over either TCP or UDP, typically over port 1194.
It can either rely on a Layer 3 IP tunnel or a Layer 2 Ethernet tap. The Ethernet tap is more flexible, allowing it to carry a wider range of traffic.
OpenVPN supports up to 256-bits encryption through OpenSSL library. It runs in user space, so avoid the underlying vulnerabilities of the system.
Another interesting application of cryptography concepts, is the Trusted Platform Module or TPM. This is a hardware device that’s typically integrated into the hardware of a computer, that’s a dedicated crypto processor.
TPM offers:
There’s been a report of a physical attack on a TPM which allowed a security researcher to view and access the entire contents of a TPM.
For Full disk encryption or FDE, we have the number of options:
To generate a 2048-bits RSA private key
openssl genrsa -out private_key.pem 2048
To generate a public key from the private_key.pem
file
openssl rsa -in private_key.pem -outform PEM -pubout -out public_key.pem
To encrypt a secret.txt
using public key
openssl rsautl -encrypt -pubin -inkey public_key.pem -in secret.txt -out secret.enc
As we have used our own public key for encryption, we can decrypt the file using our private key
openssl rsautl -decrypt -inkey private_key.pem -in secre.enc
This will print the contents of the dcrypted file to the screen, which should match the contents of secret.txt
To create the hash digest of the message
openssl dgst -sha256 -sign private_key.pem -out secret.txt.sha256 secret.txt
To verify the digest
openssl dgst -sha256 -verify public_key.pem -signature secret.txt.sha256 secret.txt
Three types of authentication methods:
Some additional categories of authentication methods:
Incorporating good password policies into an organization is key to ensuring that employees are securing their accounts with strong passwords.
A good password practice makes sure of:
The idea of describing an entity uniquely.
A system where users are authenticated by presenting multiple pieces of information or objects.
The process of using unique physiological characteristics of an individual to identify them.
They’re creating fake fingerprints using things like glue, allowing friends to mark each other as present if they’re late or skip school.
In order to issue client certificates, an organization must set up and maintain CA infrastructure to issue and sign certificates.
The certificates are checked against CRL.
A signed list published by the CA which defines certificates that have been explicitly revoked.
Lightweight Directory Access Protocol (LDAP) is an open, industry-standard protocol for accessing and maintaining directory services.
Remote Authentication Dial-In User Service (RADIUS) is a protocol that provides AAA services for users on a network.
A network authentication protocol that uses “tickets” to allow entities to prove their identity over potentially insecure channels to provide mutual authentication.
Terminal Access Controller Access-Control System Plus
An authentication concept that allows users to authenticate once to be granted access to a lot of different services and applications.
Pertains to describing what the user account has access to, or doesn’t have access to.
One popular and open standard for authorization is:
An open standard that allows users to grant third-party websites and applications access to their information without sharing account credentials.
This was used in an OAuth-based worm-like attack in early 2017, with a rash of phishing emails that appeared to be from a friend or colleague who wants to share a Google Document.
A way of defining permissions or authorization for objects.
Keeping records of what resources and services your users accessed, or what they did when they were using your systems.
What exactly accounting tracks, depends on the purpose and intent of the system.
TACACS+ is a devices access AAA system that manages who has access to your network devices and what they do on them.
RADIUS accounting can be used by ISPs to charge for their services.
The process of securing a network by reducing its potential vulnerabilities through configuration changes and taking specific steps.
A network security concept where anything not explicitly permitted or allowed should be denied.
The practice of collecting logs from different network and sometimes client devices on your network, then performing an automated analysis on them.
The process of taking logs data from different systems and matching events across the systems.
Provide protection against DoS or Denial of Service attacks.
To protect against Rogue DHCP server attack, enterprise switches offer a feature called DHCP snooping.
Another form of network hardening is Dynamic ARP inspection.
Dynamic ARP inspection is also a feature of enterprise switches.
IP Source Guard is used to protect against IP spoofing attacks in enterprise switches.
To really hardened your network, you should apply IEEE 802.1X recommendation.
IEEE 802.1x is a protocol developed to let clients connect to port based networks using modern authentication methods.
An authentication type supported by EAP that uses TLS to provide mutual authentication of both the client and the authenticating server.
Reverse proxies:
WEP supported two types of authentications:
Why WEP is for everyone:
The replacement for WEP from the Wi-Fi Alliance:
Designed as a short-term replacement that would be compatible with older WEP-enabled hardware with a simple firmware update.
Under WPA, the pre-shared key is the Wi-Fi password you share with people when they come over and want to use your wireless network.
For security, it uses:
Four-way handshake
PMTK is generated through:
WPS (Wi-Fi Protected Access) support:
Wi-Fi Protected Setup (WPS) PIN brute force vulnerability
In the ideal world, we all should protect our wireless networks with 802.1X with EAP-TLS.
There are number of network sniffing open source tools like:
The process of intercepting network packets in their entirety for analysis.
A type of computer networking operational mode in which all network data packets can be accessed and viewed by all network adapters operating in this mode.
Allows the switch to take all packets from a specified port, port range, or entire VLAN and mirror the packets to a specified switch port.
Allows us to scan across channels to see all wireless traffic being sent by APs and clients.
A super popular, lightweight, command-line based utility that you can use to capture and analyze packets.
A graphical tool for traffic monitoring, that is more powerful and easier to use than tcpdump.
IDS or IPS systems operate by monitoring network traffic and analyzing it.
The detection system would be deployed somewhere on a network, where it can monitor traffic for a network segment or subnet.
Some popular NIDS system are:
UTM solutions stretch beyond the traditional firewall to include an array of network security tools with a single management interface. UTM simplifies the configuration and enforcement of security controls and policies, saving time and resources. Security event logs and reporting are also centralized and simplified to provide a holistic view of network security events.
UTM solutions are available with a variety of options and configurations to meet the network security needs of an organization:
UTM hardware and software options:
Extent of UTM protection options:
UTM security service and tool options can include:
UTM solutions offer two methods for inspecting packets in UTM firewalls, IPS, IDS, and VPNs:
Employees, who work from home, use home networks to access company files and programs. Using home networks creates security challenges for companies. Companies can provide employees guidance for protecting their home networks from attacks. This reading will cover common attacks on home networks and steps to make home networks more secure.
Meddler in the middle attacks allows a meddler to get between two communication devices or applications. The meddler then replies as the sender and receiver without either one knowing they are not communicating with the correct person, device, or application. These attacks allow the meddler to obtain login credentials and other sensitive information.
Data Theft is when data within the network is stolen, copied, sent, or viewed by someone who should not have access.
Ransomware uses malware to keep users from accessing important files on their network. Hackers grant access to the files after receiving a ransom payment.
The concept of having multiple, overlapping systems of defense to protect IT systems.
Two important security risk mitigation components:
The less complex something is, the less likely there will be undetected flaws.
Another way to keep things simple is to reduce your software deployments.
The method or mechanism by which an attacker or malware gains access to a network or system.
The sum of all the different attack vectors in a given system.
Protect individuals hosts from being compromised when they’re used in untrusted, potentially malicious environments.
A host-based firewall plays a big part in reducing what’s accessible to an outside attacker.
If the users of the systems have administrator rights, then they have the ability to change firewall rules and configuration.
Bastion hosts are specially hardened and minimized in terms of what is permitted to run on them. Typically, bastion hosts are expected to be exposed to the internet, so special attention is paid to hardening and locking them down to minimize the chances of compromise.
Security Information and Event Management (SIEM) system is a centralized log management system.
Once logs are centralized and standardized, you can write an automated alerting based on rules.
Some open source logging servers SIEM solutions:
Lots of unprotected systems would be compromised in a matter of minutes if directly connected to the internet without any safeguards or protections in place.
Is antivirus really that useful? Sophos antivirus was maliciously compromised. How hackers bypassed the binary whitelisting defenses?
Home directory or file-based encryption only guarantees confidentiality and integrity of files protected by encryption.
Works by automatically converting data on a hard drive into a form that cannot be understood by anyone who doesn’t have the key to “undo” the conversation.
Allows the encryption key to be securely stored for later retrieval by an authorized party.
As an IT Support Specialist, it’s critical that you make sure that you install software updates and security patches in a timely way, in order to defend your company’s systems and networks.
The best protection is to have a good system and policy in place for your company.
Critical infrastructure devices should be approached carefully when you apply updates. There’s always the risk that a software update will introduce a new bug that might affect the functionality of the device.
The methods include evaluating sources for trustworthiness, SSL certificates, password managers, and browser security best practices. Techniques for browser hardening are significant components in enterprise-level IT security policies. These techniques can also be used to improve internet security for organizations of any size and for individual users.
Secure Socket Layer (SSL) certificates are issued by trusted certificate authorities (CA), such as DigiCert. An SSL certificate indicates that any data submitted through a website will be encrypted. A website with a valid SSL certificate has been inspected and verified by the CA. You can find SSL certificates by performing the following steps:
Note that cybercriminals can obtain SSL certificates too. So, this is not a guarantee that the site is safe. CAs also vary in how thorough they are in their inspections.
A common recommendation, or even a requirement, is to only support or require the latest version of a piece of software.
It’s generally a good idea to disallow risky classes of software by policy. Things like file sharing software and piracy-related software tend to be closely associated with malware infections.
Understanding what your users need to do their jobs will help shape your approach to software policies and guidelines.
Helping your users accomplish tasks by recommending or supporting specific software makes for a more secure environment.
Extensions that require full access to websites visited can be risky, since the extension developer has the power to modify pages visited.
If your company handles credit card payments, then you have to follow the PCI DSS, or Payment Card Industry Data Security Standard.
PCI DSS is subdivided into 6 broad objectives:
Security is all about determining risks or exposure; understanding the likelihood of attacks; and designing defenses around these risks to minimize the impact of an attack.
A computer program designed to assess computers, computer systems, networks, or applications for weaknesses.
Some examples are:
The practice of attempting to break into a system or network to verify the systems in place.
Privacy policies oversee the access and use of sensitive data.
Data destruction makes data unreadable to an operating system or application. You should destroy data on devices no longer used by a company, unused or duplicated copies of data, or data that’s required to destroy. Data destruction methods include:
For more information about disposing of electronics, please visit Proper Disposal of Electronic Devices, a resource from CISA.
You can build the world’s best security systems, but they won’t protect you if the users are going to be practicing unsafe security.
If they have subpar security, you’re undermining your security defenses by potentially opening a new avenue of attack.
Google Vendor Security Assessment Questionnaire
Helping others keep security in mind will help decrease the security burdens you’ll have as an IT Support Specialist.
The very first step of handling an incident is to detect it in the first place.
The next step is to analyze it and determine the effects and scope of damage.
Once the scope of the incident is determined, the next step is containment.
Another part of incident analysis is determining severity, impact, and recoverability of the incident.
The unauthorized transfer of data from a computer.
How complicated and time-consuming the recovery effort will be.
Incident handling requires careful attention and documentation during an incident investigation’s analysis and response phases.
Update firewall rules and ACLs if an exposure was discovered in the course of the investigation.
Create new definitions and rules for intrusion detection systems that can watch for the signs of the same attack again.
Organizations are taking advantage of the cost savings created by adopting “bring your own device” (BYOD) policies for employees. However, permitting employees to connect personal mobile devices to company networks introduces multiple security threats. There are a variety of security measures that IT departments can implement to protect organizations’ information systems:
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.
This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world’s finest artisanal, hand-crafted widgets. They’ve hired you on as a security consultant to help bring their operations into better shape.
As the security consultant, the company needs you to add security measures to the following systems:
Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don’t want customer information falling into the hands of an attacker due to malware infections or lost devices.
Engineers will require access to internal websites, along with remote, command line access to their workstations.
This plan will explain the steps required for improving the security of the organization’s existing infrastructure, depending upon their needs and requirements.
The company should deploy some directory services like OpenLDAP or Windows Active Directory service so:
To make the company’s website secure from external threats:
As the company is involved in the online retail, make sure:
To make the company’s internal website is secure:
To give remote access:
To protect wireless traffic:
The laptops should equip with:
The humans are always the first line of defense for any system or organization, so educating them about the security is more necessary than anything else.