Cyber Defense Magazine – July 2019

(Sean Pound) #1

The role of a good access control


There are a plenty of great ideas how to protect your IT assets while you are on the internet. For example,
the good advice is to try to make the wall between your working environment and the external
surroundings. Some experts would agree that the quite convenient approach is to encrypt your operating
system and any time you intend to access your system you need to use the cryptographic key in order to
get the approach to such an environment. Also, so many people would use the biometrics in order to
protect their machines from the unwanted accesses. In our opinion, that tactic is quite good, but it’s still
pretty hackable. So many experts’ reportings would suggest that the hackers could steal the confidential
information about someone’s biometrics attributes and when they need to obtain the access to someone’s
device – they would simply upload such a file and get the permission to enter someone’s private or
business cyber environment.


Our suggestion here would be that at the developer’s stage of the access control building up – we need
to define the path to the device which only got the approval to control its access applying the biometrics
technologies. This is so important for a reason that some weaknesses of the biometrics systems could
get removed if we attempt to make the better planning and strategy formulation at the initiation of the
programming project. In other words, if we make the good combination of the cyber defense and
developer’s strategic planning, we can expect the quite suitable solution that would minimize our chances
to get accessed without any permission. On the other hand, the biometrics access control would do its
job at the quite satifactionary level, but we still need to think hard how to make a step ahead over the
constantly arising threats.


What hackers get when access control is poor


The fact is the hacker’s love the poor access control because such a situation would give them an
opportunity to breach and exploit some IT system. The quite good illustration how someone’s access
could get banned is the ransomware attack. This sort of offense could affect the both – files and operating
environments. In other words, your access to some working surroundings as well as data and applications
could get prohibited. Also, once you get the target of such an attack, you would cope with those here we
go scary effects. As it’s well-known, if you want to return your access to such an attacked machine, you
need to pay some fee to that malicious software. So, you would get your access back – just make a
payment through some e-payment system.


That’s the quite claver trick and there are some countermeasures being developed to protect any
computer or cyber device from that cybercrime operation. In essence, maybe we could learn something
from the bad guys for a reason they would know well enough how to control someone’s access to his
working surrounding or the entire folders and files. The hacker’s attacks are coming from the outside and
if you really want to make the barrier between your and their devices maybe you could put the wall to
them which will make them struggle to even attempt anything. In other words, we would not suggest to
you to try to make your cyber criminals make an e-payment in order to get the access to your working
environment, but some kind of well-encrypted access control is more than welcome, so far.


What access control can prevent in cyber sense


The role of access control is to prevent your IT infrastructure as well as the entire computing networks
from the cyber breaches and the main goal here is to deal with the tendencies in the arena of emerging
technologies in order to gain new ideas, approaches and techniques for the best practice purposes. If
the access to your asset is in the good hands and if your risk management works well enough – you

Free download pdf