Explicit Knowlege : Knowledge i.e eazy to write down & share
Implicit Knowledge: Applied Knowledge
Tacit Knowledge: Knowledge i.e. gained through personnal experience
Knowledge Management Process
Knowledge Creation: It starts with knowledge that may come from many sources, including employees within an organization or outside individuals.
Knowledge Storage: The knowledge must then be structured in a knowledge management system for future use. This knowledge must not only be organized, but it also needs to include security features so that knowledge can be accessed by authorized personnel when needed.
Knowledge Sharing: The knowledge organization process is completed by knowledge sharing. This knowledge sharing includes everything from knowledge training to knowledge exchange, where knowledge can be acquired or enhanced through knowledge discussions.
Examples of KM: CMS, Wiki, Data Warehouse, DMS etc.
Today when we all are trying to get back to our normal lives after the struck of the pandemic COVID19, there is still something more which we are reading daily but not understanding it i.e. Cryptocurrency.
Although Cryptocurrency is an ocean itself, here we are trying to understandthe basis of it, lets see some technical terms related to cryptocurrency.
What is Cryptocurrency?
Cryptocurrency is a type of digital currency which uses digital files as money.
In technical terms, blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s ledger.
What is the role of Blockchain in cryptocurrency?
Blockchain forms the bedrock for cryptocurrencies like Bitcoin. By spreading its operations across a network of computers, blockchain allows Bitcoin and other cryptocurrencies to operate without the need for a central authority, by this, it not only reduces the risk but also eliminates many of the processing and transaction fee.
If you want toknowmore about it, then justdrop an email to info@doctoolss.com or contact the undersigned.
SIEM:Security Information and Event Management (SIEM) is a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure.
How do SIEM works?
It works by collecting log and event data generated by an organizations applications, security devices and host systems and bringing it together into a single centralized platform. SIEM gathers data from antivirus events, firewall logs and other locations; it sorts this data into categories, for example : malware activity and failed and successful logins.
SIEM tool it identifies threat through a network security monitoring, which generates an alert and identifies a threat level based on predetermined rules set. Ex: If some user tries to log into an account 10 times in 10 minutes that is okay, but 100 times in 10 minutes might be flagged as an attempted attack.
By this, it detects threats and creates security alerts. SIEM’s custom dashboards and event management systemimproves investigative efficiency and reduces time wasted on false positives.
The threat detection element itself can help to detect threats in emails, cloud resources, applications, external threat intelligence sources and endpoints. This can include user and entity behaviour analytics (UEBA) which analyzes behaviours and activities to monitor for abnormal behaviours which could indicate a threat. It can also detect behaviour anomalies, lateral movement and compromised accounts.
Main features of SIEM
Threat Detection
Investigation
Time to respond
SIAM: Service Integration and Management (SIAM) is an approach to managing multiple suppliers of services (business services as well as information technology services) and integrating them to provide a single business-facing IT organization.
If you want tomore about it, then justdrop an email to info@doctoolss.com or contact the undersigned.
As in we have entered the New year 2021 although the pandemic time is still going on but there is a relief that the vaccine is out and its dosage has been started. So we hope we all get the vaccine and we start engaging in our day to day normal life activities as it was before the COVID19 days.
It seems that Mark Zuckerberg’s security norms still needs some more modifications as its recently acquired WhatsApp the king in messenger platform has been in news due to some data leakage reasons yet again.
In the recent notification issued by WhatsApp where they have mentioned the recent update on their application which has taken the world with a storm, as it show cast the vulnerabilities it lacks.
So here at DocTooLss we compare our three Messengers which are in news and compare with eachother:
WHATSAPP
WHATSAPP
WhatsApp has kept end-to-end encryption. Plus, E2E on WhatsApp is available on every single mode of communication that the app enables such as messages, video calls, voice calls, photos, and anything else you share is E2E encrypted on WhatsApp.
What does E2E means?
E2E meaning that you and the recipient are the only people who can read the messages you send to them. WhatsApp can’t decrypt the contents of your messages, calls, photos, etc, thus ensuring your security and privacy.
“WhatsApp uses the E2E protocol developed by Open Whisper Systems, which is the name behind Signal messenger. That’s a good thing, because the Signal protocol is open source, widely peer-reviewed, and is generally considered one of the best protocols for implementing end-to-end encryption in messaging platforms.”
What is the issue with WhatsApp?
Although WhatsApp uses E2E encryption but the company does not encrypt backups (cloud and local). Also, it does not encrypt the metadata which is used to carry communication between two endpoints. This is one of the major criticisms of WhatsApp’s security model. While metadata does not allow anyone to read your messages but it lets authorities to know whom and when you messaged someone, and what was the duration for it.
What is Metadata?
Metadata is “data that provides information about other data” such as author, date created, date modified, file size, video logs , call logs , and chat history etc.
TELEGRAM
TELEGRAM
Incase of Telegram which does offer some protections to its users but however, there are some multiple pain points in the way Telegram encrypts your messages and other information.
Such as Telegram supports E2E encryption, but it’s not enabled by default and enabling it is not a cake walk as the only way to use E2E encryption on Telegram is by its secret chats feature.
The regular chats happening on Telegram are not E2E encrypted but messages sent in a secret chats are E2E encrypted. This means that the messages are encrypted on your device and but they are decrypted on Telegram’s server.
Note: So all the powers remains with Telegram that has the encryption keys on the server-side and can, in theory, access your normal chats.
SIGNAL
SIGNAL
Signal uses the open-source Signal Protocol to implement end-to-end encryption. And just like WhatsApp, the E2E encryption covers all forms of communication on Signal.
Why to choose Signal over WhatsApp and Telegram?
Signal has an edge over the both as WhatsApp which encrypts all the messages and calls (and that’s enough for most users), but Signal goes one step further and encrypts the metadata too.
There are some incredible amazing privacy features with Signal that is going to make your messaging experience even more private and secure. Such as one can lock Signal with a passcode or biometrics. There is 2FA (Two-factor Authentication) and an option to block screenshots within the app and the recent screen.
IMPORTANT: Not even that recently Signal has added a new feature to blur faces automatically before sending images. which is one of the USPs for Signal Messenger application.
Wait we are not done, Signal by default encrypts all the local files with a 4-digit passphrase. And if you want to create an encrypted local backup then you can do that as well. The app now also supports encrypted group calls .
So if you have read our complete blog, you are able to understand that how Signal is cut above WhatsApp and Telegram.
Although WhatsApp is loaded with lot many features and to us messaging means WhatsApp and its a part of our lifeline today even from Generation Z to Baby Boomers all are on WhatsApp. So it will take lot of time to move out of WhatsApp to Signal and till that time WhatsApp would have rectified its issues and load up with many more goodies so lets hope for the best and leave the rest .
The information which an organization uses to understand the threats or issues that are targeting their organization.
The primary purpose of this type of security is to keep organizations informed of the risks of advanced persistent threats, zero-day threats and exploits, and how to protect against them.
Purpose of Threat Intelligence:
To keep organizations up to date with the increasing volume of threats, including methods, vulnerabilities, targets and bad actors.
Help you being dynamic about future cybersecurity threats.
Keep the security leaders aware, informed about the latest threats which could occur in your business.
The vendors and their products which provide security related to Threat Intelligence are :
With the emerging outbreaks of the pandemic COVID19 the world has come to a standstill. Due to this, there has been a disconnect between cybersecurity executive and their organization’s security analysts.
There was a study done by the research giants Gartner who in consultation with the leaders have come up with the Road Map for the year 2019-21.
As we go down the map we realize the four phases “Monitoring”, “In Planning” , In Pilot and “In Deployment” .
We at DocToolss have often talked about Endpoint Detection and Response (EDR) , Virtualized Firewalls. The terms which we will be further talking about in our future blogs would be Statis Application Security Testing (SAST), Threat Intelligence Services, Network Sandboxing, User and Entry Behaviour Analytics, Signature Endpoint Detection or Protection and Database Audit and Protection etc.
If we further drive deep in the Road map curves, we will find out about cloud technology though we haven’t talked about it much in our past blogs but will plan to do it in our future blogs.
As we go down the map we realize the four phases “Monitoring”, “In Planning” , In Pilot and “In Deployment” .
The PaaS technology which has been categorized under “In Deployment” phase has already been talked about in our past blogs, you can click here to know more.
Further technologies terms would be explained in our future blogs, or if there is anything which you want us to explain or to drive in, we will always be happy to hear from you.
The inputs for this blogs has been taken from Gartner website, for more information on this, click here.