Skip to main content

5 popular myths of Information Security

Five myths that are popular in India about Information Security:-
1.  Information Security is all about Hacking.

Most of the students in India think that studying information security is nothing but learning ethical hacking. This is a very popular myth among youngsters.The reality is quite different,  Information security take care of  technology and compliance both, these includes information security audit of different security standards like PCI-DSS and ISO 27001 etc. It also includes things like Data Protection Act, Sarbanes-Oxley Act, IT Act 2000 etc. Vulnerability assessment and penetration testing is very popular ingredient of information security. To know more visit SANS Institute.

2. Vulnerability assessment and Penetration testing is only about technology.

When i was in first year of my engineering schools and got to know about Vulnerability Assessment and Penetration Testing(VAPT) i thought it is just about hacking with technology, but the truth is that vulnerability assessment can be done through social engineering, knowing about the organization etc. Penetration testing is also possible through social engineering .

3. To work in the field of information security one have to be a technologist.

One can be a lawyer, consultant, teacher, etc. There are various different opportunity that are offered  in the field.

4. Information security is only required if technology is used.


Even if a company does not have any electronic equipments then also it need to secure its information and most of these organization do that by complying with with different international security standards.

5. I have spent a big part of my revenue in information security and i am now fully protected. 


Mark my words that follows,  absolute security is not possible, the only thing that  an organization and people can do is, raise the bar. If Somebody says that he will provide your company an absolute security, the man is lying.

Comments

Popular posts from this blog

Did i miss to assetize Virtual Machines !

Auditee : Hi There ! Welcome, What would you like to have? Tea or Coffee? Auditor: Asset Register ! A comprehensive Asset Register is something which is quintessential for any risk management program. Everything that has to do with risk, follows from here. Information Security Risks are no different that any other type of risks. Having a few people (rarely security pro) building asset register will probably mess up any risk management at the very first stage. It has been seen that people generally miss to address technologically advanced assets (The ones they did not understand a few years ago)  to register in their asset inventory. The most obvious are the virtual machines.  Every day ,Virtual Machines (VM) are being created on the fly as per business requirement, many of them persist for years and many not so much. There are many questions  like: if that particular VM is of some value? Do I need to consider it as valuable at this point of time, whe...

What board of management want to see in your slides?

"It might sound like a hate speech but believe me Top Management doesn't care about security, disaster recovery, compliance, project management and a lots of other domains that you fantasize about. The Board only care about RISK ."    National Association of Corporate Directors was founded in 1977 with the goal to educate directors. What they are telling boards can be understood as what board really need you to put up in slides. Board want you to:- Talk about Enterprise-wide risk management issue rather than just IT issue. Talk about legal implication of cyber risk as they relate to their company's specific circumstances. Talk about risk avoidance, acceptance, and transfer. They basically have interest in knowing how much risk are we taking as compared to others and your confidence factor in your analysis. They want some metrics to make some references. Also, the Board want your security metrics to be thorough and should represent your entire landscape...

Hustle and Tussle of Vendor Risk Management

There is no doubt that we humans would have never reached this world of connected Cars, 3d printing and Space travel without trading on each other's resources . We traded what we had for the things we didn't! The world has never been as interdependent as it is right now. This is true for us as an individual and certainly for organizations across geographies. The word "outsourcing" started getting traction in around 90s, but even before that organizations were heavily using it to reduce cost and allow themselves to focus of their core business area. Family owned businesses initially outsourced a small part of their work within their circle of friend and family considering the trust factor, but as the corporation grew and the economy went global , organizations started delegating part of their work to people living on the other side of the globe. Slowly and steadily organizations have reached to a state where they don't even know who their supplier is! The trus...