Ground purpose of the RSA conference is to take defensive initiatives hang around IT security events all over the globe that is particularly associated with industries and enterprises. It was first conducted in 1991 from then it has been taking place in the United States, Asia, Europe, and Current year San Francisco hosted RSA conference.
Team of experts and researchers from The SAN Institute enlisted the most threatening attack technique any organization can counter in the current situation which may go throughout the whole year. The session was also continued until the precautionary measurements have been discussed.
Out of so many threats I have listed some of them which have been facing for several years.
Command and Control (c2)
Command and control activity was supposed as a noteworthy threat highlighted by one of the instructors named Ed Skoudis. C2 which refers to command control is syndicated by botnet activity.
Skoudis suggested that if an organization maintains to control outbound traffic and focus on beacons and log anomalies then somehow successful to get rid of c2 activity.
He further advised us to keep a check over what is moving within organization IT systems means defender can do security checks within a system.
Living off the Land
Another chief threat raised by Skoudis was that a company or organization can have venomous attackers. They intend to do malevolent activities within the company’s boundary to defame its reputation. To encounter these mentioned attacks, an organization can implement protection measurements against living off the land attacks.
He recommended that organization can take help from LOLBAS project, which scrutinize the risk of attacks by providing effective tools system.
It is associated with unauthorized access to the computer systems through different software, which can damage computer devices of any organization.
Most of the time attached malware within cables connected to systems gets them towards catastrophe. These charging cables are the main source of storing malware which is responsible to reinfect the given system again and again. This is not the only reason for the failure of the system but it also manifests fragility of the company.
He suggested that organization can purchase cables and other peripherals from trustworthy resources.
Mobile Device Integrity
Hearther Mahalik, senior instructor and director of The SANS Institute identified mobile devices as one of the most common sources of technique attacks.
Mobile phones are the foremost essential thing in our life. Cell phones can be affected when they are stolen and snatched sometimes lost. Mobile phones get repaired also. In all these circumstances memory of cell phones is not cleaned and I can be misused by anyone.
She also indicated Apple IOS devices have high risk factor due to silicon vulnerability.
Two-Factor Authentication (2FA)
Implementation of Two-Factor authentication (2FA) is to provide adequate security to mobile users.
Hearther Mahalik highlighted the fact that some apps require phone numbers and automatically this gives rise to security issues in the sense that one can either give up from phone number or it can be allotted to another user. To low down the risk of being misused cell phone number by anyone else company can allot password as well as phone number which can change once it is entered in any application.
She is an enthusiastic Pakistan based article writer and holding master’s degree in physics. She is stay at home mom. She loves to write on different niche