Saturday, January 7, 2017

Know about Data Classification

Data Classification

Data classification is the process of analyzing structured or unstructured data and organizing it into categories based on file type, contents, and other metadata. Further these data may be used and protected more efficiently. Data classification includes tagging data to make it easily searchable and trackable. It also removes multiple duplications of data, which can decrease storage and backup costs.

Further data classification can be done based on content, context and user level selection. 

Highly Confidential Data

Sensitive information subject to a need-to-know basis for certain individuals or groups that are typically approved by organization where unauthorized disclosure may cause severe financial or reputational damage.

Examples: 

  • Firm legal documents
  • Employee records
  • Financial data
  • Account number/ credit card number / debit card number
  • Non-public client board member information
  • Some client data
  • Personal data (PII) such as ID numbers
  • Special Categories of personal data (Sensitive Personal Data) such as political opinions, religious beliefs, genetic data, health data

Confidential Data

Information subject to a need-to-know basis for certain individuals or groups where unauthorized access may cause significant damage that may result in financial penalties.

Examples: 

  • Client data
  • Non-public or proprietary information such as marketing and business development plans
  • Work products and deliverables
  • Personal data (PII) such as ID numbers

Internal Data

Proprietary information intended for internal use or authorized external use where unauthorized external disclosure may cause embarrassment or minor damage to organization.

Examples: 

  • Training materials
  • Organizational charts
  • Third Party content

Public Data

Information intended for public use where public use and disclosure would not negatively impact the Organization. 

Examples: 

  • External marketing materials
  • Public website/ blog content
  • Employee directory
  • Whitepapers/ publications
  • Company holiday calendar

All organizations shall Data Classification policy. The policy defines who are responsible for classifying data for different programs or organizational units. It further describes below points;

  • Which person owns the data or information?
  • Who is responsible for integrity and accuracy of the data?
  • Where is the data stored.
  • How data backup is taken.
  • What is the retention policy.
  • What is data destruction policy.
  • Whether all are being documented or not?

Therefore this is just a basic information on data classification or information classification.

-DR

Thursday, January 5, 2017

Everything about Dark Web the hidden iceberg.

Dark Web

Many of you must have heard this Deep Web or Dark Web or Dark Net and many may not have heard. Dark web is a hidden network from the internet we see on day to day basis. No traditional search engines (Chrome, Mozilla, IE, etc.) will be able to find or locate the dark web because, those information are not indexed by search engines. Specific software, search engine optimization and configurations were made behind. 

This black market deals mostly on pirated software, illegal arms trafficking. It is also known as black market which is operated online and behind the curtain.

Websites on the dark web use much encryption software to keep their visitors and owners remain anonymous and hide their locations over the network and making it as home to so much illegal activity. If you tap into the dark web, you’ll find everything from illegal drug and gun sales to illicit pornography and stolen credit card, bank account number, banking passwords and Social Security numbers.

As per Norton reports, key event for the dark web came in 2002, when the alpha version of the Tor web browser was launched. This browser, short for The Onion Router, is free and open-source software that allows people to travel the web anonymously. The development of the Tor Browser that is commonly used today to access the dark web began in 2008. Even if anyone wants to access dark web, its legal. No worries, but yes if you buy items or deal with any matters through dark web, then it becomes illegal.





When you go and browse dark web you can find items in sell such as;

  • Stolen credit card numbers
  • Firearms
  • Pornography
  • Sex racket
  • Stolen gold and jewelry
  • Stolen Social Security numbers
  • Marijuana
  • Guns 
  • Costly apparels
  • Fake passports

The deep web is little bit safer than the dark web. Accessing the contents are also safe. Deep web is little bit different than dark web, in deep web you can find stored information on below items;

  • The content of your personal email accounts
  • Your social media account contents
  • Your online banking contents
  • Private database of companies and corporate
  • Medical records
  • Legal documents

How to access dark web

Accessing to dark web is not a difficult task, all you need some search engine and some browser to access. The most popular one is TOR browser, you can not access using chrome or Mozilla. People use this browser to become anonymous while browsing. But there is some tricky methods to find the dark web sites through the TOR. Again remember it is not safe always to browse dark web contents, you might require one VPN connectivity for adding more safe to your browsing. Never share any personal information in dark web.

If you have further suggestions, please feel free to provide below.


-DR


Network Scanning Tools

Network Scanning through Nmap and Nessus Network scanning is a process used to troubleshoot active devices on a network for vulnerabilities....