Thursday 28 February 2019




Inside out : Body and Mind

How do we describe a flower, By its colour or fragrance?. Intact, by both. It is not only its beautiful colour that fills our hearts with joy but also and essentially the captivating and exhilarating fragrance it emits into the air. Similarly , a man is not only  what he looks like- his complexion, clothes, physique etc, but also what he speaks, does and think. apart from his exterior, it is essential to look him inside out to have his thorough portrayal. It is rightly said that all beautiful faces do not possess the hearts of gold, and all ugly faces do not possess a devil “s hearts. A golden pot may contain honey, so we can not judge people by their coats.. Being proud of his beautiful body, once a leopard bragged to a fox “Look at my skin, well decorated with spots. That makes me the finest specimen among animals “But the fox , as foxy he was, retorted : “ And more beautiful than you stand I, decorated so well, not in body, but in mind “ Bhim Rao Ambedkar “Unlike a drop of water which loses its identity when it joins the ocean, man does not lose his being in the society in which hje lives”. This Identity is one’s personality. It encompasses many things in its ambit. Many things mixed up to form a personality. Literally speaking, personality is made from the word to which we affix two suffixes, person +al+ity. Person  means a living individual being. Adding al to it connotes having  individual traits and suffixing ity to it further extends it to convey to have the states of being individual. So literally personality means to have distinct qualities  or features which distinguish one person from the other from any other and so on. Human personality is not   static piece of art that remains the same, but is dynamic and grows with the passage of time  as an earthbound caterpillar goes into flying butterfly, so must human personality grow  - both in mind and body. Mind is the CEO and the body is the servant that carries out the orders and the instruction  sent by the mind. We can not have solid mind without solid body and without solid mind human body is useless. So finally the character of a person could not judge by  external body , it should be judged by by his / her internal  beauty.  It is not necessary the person who has beautiful body has a good character and good attributes. Therefore by the physical appearance the mind of a person could not be judge. But    the mind of a person can reflect hi / her body language. Therefore inside mind always reflects  by the physical body of a person. So we should judge a person by his /her mind and physical body both. Generally it is understood that the mind is a controller of the body, and body is the servant of mind.



Dr. Hakimuddin Khan

ASSOCIATE PROFESSOR

DEPARTMENT OF INFORMATION TECHNOLOGY

Monday 11 February 2019


Email Security: Issues and Awareness
In an organization each and every individual should aware of email security issues to be taken care of by one and individual. There are various challenges which are to be overcome to get rid of them. Few issues and challenges one should be area of are:
1)      User Behavior: The end users are at the top pf email security issues list because the decisions they take can either prevent bad situations or creates the worst situation. It’s a major issue in an organization as the perception of end user and IT security experts appears to be at odds many times. When the security experts see sharks in the form of threats swimming around, end users simply perceive it in the form of spam. Few organizations do Ethical phishing attacks and social engineering penetration testing on their employees to assess their security awareness. The results reveal that even being aware of attacks, they click on phishing emails.
2)      Targeted Phishing attacks can make a comeback:Earlier Work-intensive manual attacks were common. Now hackers perform targeted phishing attacks or automated attacks which need much more efforts and are a much bigger payoff. Hackers use public social media resources to target a person or a company and learn their particulars like who’s who in the company. Once they get the knowledge, it becomes easy to masquerade as the boss and fire whaling attacks. It is very easy for them to include company logo and other company’s information to make a malicious email more realistic and credible. In one case Hacker has impersonate the cellphone number of a boss and triggered an attack by sending a text message to an employee that referenced as email message.
3)      A Gateway to takeover Account to exploit more: Hackers penetrates less secure computers like laptops used in public Wi-Fi and are then able to weaponize them against the organization. Hackers take overs the Account of an organization which is an indirect challenge to email security. Once a computer of an organization or of an individual is compromised, hackers use Mimikatz, an open source tool and Microsoft’s built-in Remote Desktop Protocol to dump all credentials of a machine. Once the account get takeover by Hackers, they can use powerful tools like Power shell, Windows Management Console to reach out to machines exists on the corporate network. They can easily uses services to exploit vulnerabilities on networked computers.
4)      IoT and Mobile Device Security Challenges: IoT and handheld devices can also be compromised and can become a part of phishing and other security attacks. Hackers can use a targeted phishing attempt or can take over account easily via a clean application of an iPhone or android Phone. This application might contains a code that takes users to a phishing site that requests its credentials Even IoT devices like surveillance cameras , Wi-Fi routers based an open source code are open and viable to exploitation. Usually IoT devices are small networked computers which all can be used as jumping off points for security incursions.
5)      Think Beyond Perimeter Security: All the organizations implements highly effective security perimeters like firewalls, Web Application Firewalls, intrusion Detection/prevention systems and email security gateways. That is why Hackers hack machines and compromise emails and users that might be outside the perimeter. They use plain and harmless email to trap inside users outside the perimeter. Perimeter security plays an essential role but at the same time one has to be careful about other potential attack surfaces.
Summary: It is very much required to be vigilant as vigilance is the key in order to address email security issues. It has been observed that the nature of attacks transforms boundlessly. There is no standard way, how the hackers can attack for better or worse and it’s very difficult for security vendors to have a standard method to identify and stop these changing attacks.
Ms. Arpana Chaturvedi
Assistant Professor
Information Technology