Tuesday, July 20, 2010

Expanding IT Security Market

Owing to the increasing deployment of IT –enabled business solution, and procreating cyber attacks on the websites of Government and Enterprise- IT Services and Products are witnessing exponential growth.

Because of these reasons it has become necessary for them to have an updated and strong IT security infrastructure in order to secure their vital information from malicious cyber attackers. Fast Internet adoption in various emerging countries is also fuelling the demand for IT security.

“The rise in the security market is fuelled by the increasingly sophisticated threats. The security and vulnerability management (SVM) market is predicted to post the largest growth this year among the segments of the IT security industry. This market is expected to expand up to 19%.

Companies have been encouraged to adopt advanced security tools to automate their operational requirements. This resulted from the excess workload due to the significant number of systems and applications that an IT organisation needs to handle.

So with this increasing demand and need, Global IT Security is going to crop 5.8 million new job opportunities and 75,000 new businesses in next four years. So here comes the employers looking for people with right attitude and right kills to fit in the role of IT Security Professional.

Pen Testing and its scope

Penetration Testing generally known as Pen Testing is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source, known as a Black Hat Hacker, or Cracker. The process involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, both known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities.

The intent of a penetration test is to determine the feasibility of an attack and the amount of business impact of a successful exploit, if discovered. It is a component of a full security audit.


Importance Of IT Security:-

Information is an essential resource for all businesses today and is the key to growth and success. However, you need to ensure that the information held on your IT systems is secure.

The impact of a security breach may be far greater than you would expect. The loss of sensitive or critical information may not only affect your competitiveness and cash flow but also damage your reputation - something which may have taken you years to establish and which may be impossible to restore.

Monday, July 19, 2010

Can Hacking Be Ethical?????

Thanks to the aid of today’s Mass Media, that the term “Hacking” has developed more of negative connotation than the positive. And if adding Ethical before it no wonder you have confused the audience all the more.

Hacking is a vague term which is generally correlated with people having malicious intentions who can be termed as ‘Crackers’.

But my understanding say broadly speaking hacker fall in to following 3 buckers:-

  • Crackers- Hacking Activist: - who are real anti-social elements and have vindictive & despiteful intentions behind it.
  • Hobby Hacker : - kiddos who such things as part of their hobby by simply downloading few hacking tools, nothing really harmful.
  • IT Security Research Analyst- Professional : - these are the people we have to work hand-in-hand with so as to safe guard our Data Assets!!!!!!

Hackers have a lot to offer... So let’s give them the respect they deserve for safe guarding our organisation rather than defaming them.
And yes I do believe that if defined properly hacking is a ethical activity as long as it’s for social benefit.

What’s your opinion people......??????