Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • How SCM Can Protect Against Skills-Based Errors and Mistakes
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

How SCM Can Protect Against Skills-Based Errors and Mistakes

5 years ago Ehab Nour
How SCM Can Protect Against Skills-Based Errors and Mistakes

People make up an important part of an organization’s security posture. That’s because some employees have the rights necessary for accessing sensitive data as well as the privileges for viewing and/or editing critical systems. If those individuals have the right focus and training, they can play a crucial part in keeping those assets safe against digital attackers. But if they aren’t paying attention, they could do something that puts their employer at risk.

Take cloud security as an example. As reported by the Wall Street Journal in August 2019, misconfigurations and other human errors constituted the leading cause of 95% of cloud-based data breaches. The Wall Street Journal reported that this trend was expected to continue for years to come.

Human errors come in many different varieties, so it’s not always easy for organizations to keep their assets secure. Let’s look at two common types of human errors to better understand these challenges.

Human Error Type #1: Skills-Based Errors

Skills-based errors tend to occur during highly routine activities. The task has probably been performed correctly many times before and is more routine, meaning they can be performed with less conscious attention on the part of security analysts.

Here’s one example. A good patch management program is one that first identifies patches, acquires them, tests them, installs them, and then verifies them. There could be scenarios where a bad patch can cause downtime. But as this is a routine task, a user may choose to install patches without proper testing, or they may not make sure that the patch they tested is the one that is pushed to all other production systems.

Here are two other examples of skills-based errors:

  • Following suspicious email links and attachments: Sometimes users reply to suspicious emails, click on embedded links, and/or download suspect attachments. These actions can undermine the machine’s security by loading malware.
  • Using personal devices for work purposes: Users commonly access the organization’s sensitive data, connect their devices to the wireless network, and connect their tablets or phones to their local PCs. Those personal devices are not fully controlled or monitored, so they may suffer from security risks such as malware that could easily spread across the organization.

Human Error Type #2: Mistakes

Mistakes are decision-making failures. They may be due to time pressure. One example is disabling the Windows firewall to allow certain firewall ports during some implementations. This may cause the PC to be exposed for unwanted incoming and outgoing traffic.

Organizations can also suffer mistakes in form of password problems. The National Centre for Cyber Security’s 2019 report says that “123456” remains the most popular password in the world and that 45% of people reuse the password of their main email account on other services. This is partly the result of how organizations don’t implement the right policy to users to secure their accounts, thus allowing users to create very weak passwords for accessing access to their personal devices and even secure servers. It’s even worse if organizations allow users to have an unlimited number of failure login attempts to their machines without ultimately locking their accounts.

As another example, there’s the issue of installing unauthorized applications to a secure environment. This can provide attackers with a backdoor in that they can use those applications to find vulnerabilities and start exploiting those machines.

What Tripwire Can Do to Help

Tripwire can help organizations by scanning their environments’ configurations and giving them a report detailing what secure configurations need to be implemented and how they can implement those changes. As the leader for the security configuration management, Tripwire can help organizations to implement thousands of policies across global standards like PCI, NIST, CIS, HIPAA, NCA, NESQ, NIA, NERC, and more. It can then help them to monitor the files and misconfigurations before issuing a report on who did what. Such information can empower organizations to know exactly what’s happening on their configurations, critical folders, and paths. (This can be done using Tripwire’s file integrity monitoring capabilities.)

Going back to the patching example discussed above, for instance, Tripwire Enterprise can detect unauthorized changes even when they happen during a patch as well as automatically authorize patch changes referring to a node. (This node can be the one where security personnel tested the patch.) If an element matches an element on the reference node, this is a good change. If an element does not match an element on the reference node, it is a bad change.

As for the Windows firewall change example, Tripwire Enterprise will detect this and alert of a compliance test failure. This allows users to be alerted and to avoid these mistakes. Additionally, it will help them to follow the proper process so that the organizations stay aware about this change and not make a mistake due to time pressure or doing too many things at once.

Learn more about how Tripwire can minimize the threat of human error.

The post ” How SCM Can Protect Against Skills-Based Errors and Mistakes” appeared first on TripWire

Source:TripWire – Ehab Nour

Tags: Cloud, Critical Severity, Goverment, TripWire

Continue Reading

Previous ‘PwnedPiper’: Devastating Bugs in >80% of Hospital Pneumatics
Next Chinese Hackers Target Major Southeast Asian Telecom Companies

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

15 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

16 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

[Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It)

17 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Most Remediation Programs Never Confirm the Fix Actually Worked

17 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

18 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data

21 hours ago [email protected] (The Hacker News)

Recent Posts

  • Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday
  • Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
  • [Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It)
  • Most Remediation Programs Never Confirm the Fix Actually Worked
  • Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT