ct logo wslogan

4 minutes reading time (704 words)

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

Brute Force Attacks
Let’s say that a robber wants to break into your home. He will try to go through a door, but he might not have the keys required to get in. In this case, he will have to use everything at his disposal to get in. He might try to kick the door down or smash a window. In other words, he’s getting into your house by brute force.

Brute force in computing can consist of a hacker trying to use as many passwords as possible in a short period of time to get in. There are programs that can randomly generate countless passwords in seconds, making this method of attack quite devastating when it’s effective.

Social Engineering
Let’s say that you have a new neighbor on your street. They ask you over for dinner and you get to know them. You feel like you are getting along with them quite well--well enough to trust them to water your plants while you’re out of the state on vacation for a few weeks. You give them a key, but when you come home, all of the plants are dead and you’re missing some furniture or technology. Yup, they’ve robbed you--you’re sure of it.

Social engineering takes a calculated approach to hacking and data theft. Hackers will make personalized attempts to steal your passwords and information by taking on the identity of someone you think you can trust with this information, like an “old friend” or “your elderly grandmother.”

Security Exploits
Robbers may try to find weak points in your front door. Maybe the door doesn’t quite lock all the way due to a defect in the manufacturing process. In this case, the robber may research what the weak points of the door are so that they can know the best and most efficient way of getting past your defenses.

Security exploits are weaknesses in software on your computer that allow hackers to sneak into your system and get into all sorts of trouble. These can range from weaknesses in the way that sensitive information is handled, to particular lines of code that create problems for your organization. Ultimately, it only takes a single crack in your defenses--a security exploit--to allow a hacker into your infrastructure.

Trojan Horse
Someone might knock on your door and tell you that something within your household is in need of repair. Maybe they know that you have a leaky faucet that needs to be addressed, or they know that you have some concerns about your furnace. They are then invited into your home and go about their business. You may then notice that you’re missing important items afterward, hinting that the off-the-street good Samaritan was, in reality, a scammer.

Trojans work like this in many ways. Just like the Greek horse of old, a Trojan sneaks onto your system and plants a backdoor, allowing for secret re-entry at a later date. Often times, a Trojan will use a larger data breach to mask its presence, and then continue to steal information in small doses as time goes on.

Two-Factor Authentication
Two locks are better than one in most circumstances. For example, you can have one lock on the doorknob and another on the deadbolt, which keeps the door fastened in place even if the door is forced open near the doorknob. Basically, having two types of locks makes it twice as hard to get to anything of value.

Two-factor authentication can be used to provide this secondary credential to your digital assets, including online accounts or network logins. A secondary code can be sent to an email address or mobile device, which allows your employees to access important information only when both of these are present.

Does your organization need help with network security? i-medIT can help. To learn more, reach out to us at 630-549-6199.



Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Business Computing Cloud Hackers Backup Microsoft Innovation Malware Tech Term Internet Email Android Mobile Devices Data Small Business VoIP Network Security Cybercrime Ransomware Windows Smartphones Business Data Backup Efficiency Software Hardware Cloud Computing User Tips Browser Smartphone Business Management Internet of Things Computers How To Cybersecurity Computer Communications Upgrade Business Continuity Managed IT Services Productivity Mobile Device Management Automation Artificial Intelligence Money Router Hosted Solutions Data Recovery Chrome Communication Network Law Enforcement Collaboration Social Engineering Managed IT Services Social Media Save Money Windows 10 Bring Your Own Device Alert Vulnerability App Gadgets Safety Bandwidth Data Protection Saving Money Word Telephone Systems Phishing Server Outsourced IT BDR Office 365 Connectivity Data Security Data Breach Spam Two-factor Authentication Operating System Disaster Recovery Windows 7 Data Storage Update Cleaning Networking Passwords Infrastructure IT Support Miscellaneous Sports Quick Tips Gmail IT Management Password CES YouTube OneNote Windows 10 Redundancy IT Plan Recovery Content Management Virtualization The Internet of Things Avoiding Downtime Comparison VPN Applications Productivity Data storage Physical Security Wi-Fi Unsupported Software Website Blockchain IT Services Microsoft Office Government Private Cloud Google Drive Paperless Office Apps Downtime Internet Exlporer Identity Theft Remote Monitoring Spam Blocking Business Intelligence Managed IT Public Cloud Facebook BYOD Reputation Wireless Internet Credit Cards Current Events Wireless Technology Encryption Telephone System Criminal Computer Care Windows 10s Devices HBO Millennials Meetings Laptop Apple Password Management Botnet Hiring/Firing Hybrid Cloud Multi-Factor Security Staff Skype Wireless Charging Conferencing End of Support Access Control Customer Wire Flash Fraud Patch Management Knowledge Files Accountants Samsung Tech Support Thought Leadership Frequently Asked Questions Workforce Workplace Tips USB IBM Touchpad iPhone NIST Travel Password Manager Automobile Monitor PDF Authentication Trending Legal Office Start Menu Cortana Emails Internet exploMicrosoft Solid State Drive Hacking Marketing Smart Office Amazon Scam Network Congestion Black Market History Google Docs Value Shadow IT Excel Telecommuting Supercomputer Data loss Managed Service Provider Cryptocurrency Business Mangement Work/Life Balance Settings Nanotechnology Keyboard Relocation Servers Tools Google Apps Advertising Audit Document Management Sync Amazon Web Services IT Consultant Chromecast Practices HaaS Entertainment Addiction Tip of the week Remote Work Big Data Budget Screen Mirroring Safe Mode Recycling Uninterrupted Power Supply Going Green Smart Tech Specifications Mobile Device Root Cause Analysis HVAC Employer-Employee Relationship Electronic Medical Records Outlook HIPAA Holiday Computer Fan Online Shopping Software Tips User Error Hosted Computing Voice over Internet Protocol Cache Windows Server 2008 Cast Health Data Management NarrowBand Digital Signature Virtual Assistant eWaste Charger Office Tips Enterprise Content Management Workers Netflix Humor Flexibility Human Resources FENG Machine Learning Telephony Evernote webinar Robot DDoS Inventory Wireless Thank You Emergency Scalability Wearable Technology Worker Commute Worker Mobility Risk Management Assessment Company Culture Education Smart Technology Congratulations Search WiFi Content Employer Employee Relationship Rootkit Politics Television Managing Stress Computing Infrastructure Two Factor Authentication How to Techology Audiobook Twitter Instant Messaging Troubleshooting Computer Accessories Training Information Technology Best Practice Public Computer CrashOverride Webinar Loyalty Transportation Vendor Management Experience Remote Computing Users Bluetooth IT solutions SaaS Benefits IT Support Books Video Games Music Virtual Reality Save Time Battery Firewall