Justin . Justin .

What is Critical Infrastructure Protection?

Critical infrastructure protection (CIP) is the process of protecting important public or private infrastructure from physical and cyber threats like terrorism, malicious hacking, natural disasters and other man-made disasters. CIP is an important part of maintaining a safe and secure environment and ensuring continuity of operations. Examples of critical infrastructure include: electrical grids, telecommunications networks, water/wastewater systems, transportation networks, and hospitals. CIP involves planning and implementing measures to secure these assets and protect them from harm.

 Here are the important elements to having an effective CIP program:

1) Establish a Comprehensive Threat Assessment: Establish a transparent process to identify threats, evaluate the severity and probability of the threats, and analyze potential impacts.

2) Improve Physical Security: Install physical security measures such as fences, cameras, and alarms at vulnerable infrastructure sites to reduce the risk of attack.

3) Implement Security Policies: Develop and maintain strict security policies and procedures to ensure that system users are aware and adhere to best practices.

4) Invest in Infrastructure: Invest in new technologies and infrastructure to detect and respond to threats quickly.

5) Adopt Security Software: Utilize security software and monitoring tools to help protect critical infrastructure systems from cyber threats.

6) Train Employees: Provide employees with the necessary training and awareness to recognize and respond to security incidents.

7) Monitor the Network: Monitor network traffic for any suspicious activity and respond quickly to incidents.

Stay safe!

V/R,

Justin

Read More
Justin . Justin .

What is the Dark Web?

The dark web is the part of the internet specifically designed for anonymous communication and activity. It is a network of websites that exist on an encrypted network and can only be accessed using special software such as Tor. The dark web is often associated with illegal activities such as drug dealing, money laundering, and the sale of stolen data.

Accessing dark web forums requires the use of specialized software such as Tor. The Tor browser is an open-source browser that allows users to access the dark web anonymously and securely. Additionally, it is strongly recommended that users take extra precautions such as using a VPN and strong passwords when attempting to access dark web forums. Furthermore, it is important to note that many dark web forums will have certain requirements for allowed content, and the user must follow these rules or risk being banned from the forums.

I want to be clear here. I have had a lot of people ask me what dark web means and I considered not writing on the manner. However, for security professionals with a need, knowing how to navigate dark web content can be a useful skill when performing intelligence/counter-intelligence operations. This is not an activity for those that are not educated and skilled in the appropriate safeguarding required for a safer experience when doing this research. PLEASE BE CAREFUL.

***DISCLAIMER: These site are listed for informational/educational purposes only. Only experienced cybersecurity personnel should attempt any further research beyond this point. I am not to be held accountable for any damages/breaches as a result of negligence to safeguard appropriately.***

These are some of the most common examples of dark web sites:

1. Dread

2. DarkWebNews

3. Torch

4. The Hub

5. DeepDotWeb

6. The Librarians

7. Torum

8. TheRealDeal

9. Hidden Answers

10. The Hidden Wiki

Please, STAY SAFE.

V/R,

Justin

Read More
Justin . Justin .

What is OSINT?

Open source intelligence (OSINT) is intelligence derived from publicly available information from sources such as newspapers, periodicals and websites. OSINT is typically gathered from open sources such as the internet, but can also come from paper documents.

It is used in areas such as military, law enforcement and intelligence activities to provide insights into a variety of topics, such as:

1) Monitor social media for content that reflects conversations about your brand, competitors, products and services.

2) Analyze the sentiment of online conversations to inform your messaging.

3) Monitor review sites, blogs and influencer channels to understand customer feedback.

4) Identify potential sales opportunities, such as potential customers in specific locations.

5) Analyze public records to obtain insight into people or organizations relevant to your business.

6) Track trends across online channels to anticipate shifts in the market.

7) Utilize IP address research to identify potentially malicious actors.

Stay safe!

V/R,

Justin

Read More
Justin . Justin .

Effective Risk Management

Effective Risk Management is the process of identifying, assessing, and prioritizing potential risks in order to minimize the negative impact they may have on an organization. It involves developing strategies and plans to minimize or prevent the occurrence of risks, identify early warning signs, respond quickly and appropriately when risks occur, and explore ways to take advantage of opportunities while mitigating risks.

1) Identify and assess potential risks: One of the first steps in any risk management strategy is to identify and assess the known risks associated with a project, process, or other engagement. This helps create an informed understanding of the level of risk and types of risks involved.

2) Develop realistic response plans: After you have analyzed the risks, it’s time to create a response plan for each one. This should include actions that can be taken to reduce or eliminate the risks, and contingency plans in case any of them are realized.

3) Implement tools and processes for monitoring: You’ll need to set up tools and processes for monitoring risk factors to ensure that the risk management plan is working as expected. This includes monitoring tasks and activities to ensure that they’re meeting timelines and meeting the desired outcomes.

4) Implement effective communication strategies: Communication is key when it comes to effective risk management. Regular meetings and updates should be held to keep everyone informed of any changes or new risks. This helps ensure that everyone is on the same page and that response plans are properly implemented.

5) Be prepared to adjust as necessary: Because risk assessment is an ongoing process, you should be prepared to make adjustments to your risk management plan as conditions change. Monitor risk factors closely to ensure that the plan remains effective over time.

Stay safe!

V/R,

Justin

Read More
Justin . Justin .

Intelligence Threats Response

Intelligence threats can be identified by staying aware of changes in the security environment, monitoring for suspicious activity and activity associated with hostile organizations or individuals, conducting background checks and investigations, assessing technology-related vulnerabilities, and implementing detection, prevention and counter measures. Additionally, it is important to be aware of news and media reports and international developments that could present a threat to your organization’s security.

Once an intelligence threat has been identified, here are the general steps to develop an appropriate response:

1) Assess the potential threat: Gather as much information as possible about the nature, intent and capabilities of the threat.

2) Develop a strategy: Develop a plan of action to address the threat. This could include measures such as counterintelligence operations, cyber defenses or legal measures.

3) Execute the plan: Implement the strategy and take any necessary actions.

4) Monitor the situation: Remain vigilant and monitor the situation on an ongoing basis to ensure that the threat is contained and any changes in the threat level are accounted for.

5) Communicate: Ensure that the appropriate individuals and agencies are kept updated on developments so that any further action can be taken as quickly as possible.

Stay safe!

V/R,

Justin

Read More
Justin . Justin .

Incident Command Basics

Incident Command is a system that is used to manage emergency situations, allowing for swift and efficient response in the event of unforeseen events. The system provides an organized and unified approach to coordinating personnel, equipment, and communications. It is based on a variety of interrelated principles and process, which combine to create a unified and efficient plan of action. These principles include responsibility and authority, unity of command, span of control, unity of effort, common terminology, and a flexible structure.

Here are the basic elements of an effective Incident Command:

1) Designate a Command Post: Choose a central location to serve as the hub for communication and resources. Make sure the area is well lit, secure and comfortable.

2) Assign Personnel: Assign personnel to take charge of different components such as logistics, operations, and communications. Make sure each position is clearly defined.

3) Outline Crisis Management Strategies: Establish protocol for decision-making, communication, and information sharing. Have written plans in place for each component.

4) Schedule/Conduct Command Center Briefings: Brief command center personnel on the current status of the incident, management strategies, and any new developments.

5) Use Effective Communication: Use clear, controlled language to convey information to command center personnel. Utilize a range of communication channels and technologies, such as radios and telephone.

6) Monitor Progress: Continuously track and analyze current conditions and modify the incident plan accordingly. Make sure command center personnel is kept up to date with any changes.

Stay safe!

V/R,

Justin

Read More
Justin . Justin .

Why is Physical Security Critical?

Physical security is important because it helps to protect people, property, and assets from theft, vandalism, and other forms of damage or disruption. Unfortunately, many companies consider physical security as a burdensome hassle that does not provide a return on investment… but it does.

Physical security is a good investment for companies because it reduces the likelihood of costly loss due to theft, vandalism, or other malicious activity. Additionally, it helps protect company assets and the safety of employees, customers, and visitors. A secure site may also be a deterrent to crime, keeping troublemakers away in the first place. Finally, physical security adds a layer of protection to cyber security measures, helping companies protect their data and maintain high levels of compliance.

Here are some of the most important things an organization can do to set up a sound physical security foundation:

1) Establishing Access Controls: Establishing access controls ensures that only authorized personnel are allowed to access physical premises, resources and information. This can include the use of access cards and other biometric entry techniques.

2) Training and Awareness: Training staff on physical security protocols and emphasizing the importance of security will help ensure that they are aware of their responsibilities when it comes to physical security.

3) Secure Physical Structures: Securing physical building elements such as doors, gates, windows, gates, safes, and interior walls will help protect physical assets from unauthorized access.

4) CCTV Surveillance: Installing CCTV surveillance systems can help deter unauthorized access as well as provide a record of activities for post-incident investigations in the event of a breach.

5) Monitor Perimeter: Installing perimeter alarms, fencing, and other measures to monitor and alert staff of potential intrusions can help provide an early warning in the event of a breach.

6) Secure Delivery and Shipping Areas: Having secure areas for receiving, storing, and shipping goods can help reduce the risk of theft or unauthorized access.

7) Establish An Incident Response Plan: Establishing an incident response plan will help ensure staff are prepared if an incident occurs and that they know the appropriate steps to take in such a situation.

As always, good security starts with situational awareness and becomes a habit.

Stay safe!

V/R,

Justin

Read More
Justin . Justin .

What’s on your phone?

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Amet aliquam id diam maecenas ultricies mi eget mauris.

According to Simform, the average person has 40 applications installed on their phone. Almost 90% of the time there are only about 20 of those 40 that are actually being used.

This leaves a significant amount of your device laden with software that could have malicious intent. You could be at risk on releasing sensitive data such as:

  • Phone calls

  • Text/picture/video messages

  • Email (both personal and corporate)

  • Web browsing history

  • Passwords

  • Location data

If you are looking for an example of an application that could be a security transgressor, look no further than TikTok. The Guardian published an in-depth article that calls to attention the threat that TikTok could pose to information security.

What can you do to better secure your device?

  • Uninstall applications that are not used often.

  • Only install applications that are approved through their respective App Stores (Apple/Google).

  • Research the applications you wish to install and only enable permissions that they absolutely require.

  • Make a habit of reviewing your applications monthly, including how much data is being sent/received from each. If you see a significant amount of data being received/transmitted on a seldom used application, perform you due diligence to ensure it is safe to continue to use it.

  • Check you children’s phones/devices for questionable applications and take action, when necessary.

Electronic security is everyone’s individual concern.

Stay safe!

Very respectfully,

Justin

Read More