To build a successful GRC solution it is absolutely critical to get Management support for GRC project. However to achieve this you must be able to demonstrate the value that GRC projects can add to the business. In this post we look at some essential governance concepts
Continue reading “Essential IT Governance Concepts”
The perils of direct entry uploading into a database are well known … and the recent revelation by CBI on the modus operandi used in Satyam to book invoices is a grim reminder of this.
CBI has claimed to have unravelled through cyber forensic technique the modus operandi of Satyam in generating false invoices to show inflated sales. Continue reading “Direct Entry Upload – the Satyam Fraud Modus Operandi”
The OSI model describes the flow of data in a network, from the lowest layer (the physical connections) up to the layer containing the user’s applications. Data going to and from the network is passed layer to layer. Each layer is able to communicate with the layer immediately above it and the layer immediately below it. This way, each layer is written as an efficient, streamlined software component. When a layer receives a packet of information, it checks the destination address, and if its own address is not there, it passes the packet to the next layer. Continue reading “James Bond Meets The 7 Layer OSI Model-Technology Demystified”
Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in October 2008. The worm uses a combination of advanced malware techniques which has made it difficult to counter.
Experts say it is the worst infection since the SQL Slammer. Estimates of the number of computers infected range from almost 9 million PCs to 15 million computers, however a conservative minimum estimate is more like 3 million which is more than enough to cause great harm.
Continue reading “Conficker Virus – A simple check”
A proxy server is a server that acts as a gateway between a client computer and a larger network like the internet. This can be better understood through an illustration of daily life usage of proxy server. We are familiar with configuring proxy settings in the ‘Network Settings’ tab of our web browsers. We use a proxy in this case. A proxy server receives a web page request from the local internal user. The proxy server then acts as a client on behalf of the user, uses its own IP address to request the page from the server out on the internet. When the page is returned by the internet server, the proxy server relates it to the original request and forwards it on to the local internal user. Continue reading “Basics of a proxy server and means to secure it”
Malwares are malicious softwares that are created with a intention to damage information processing facilities. It is different from error in software which may cause the same end result but is not intentional. Malwares are written with a specific purpose to cause damage. What are the controls you can use for protection
Continue reading “Increasing threats from Malwares – Controls”