Omerta.com
By Paul Neumann
()
About this ebook
How do you protect your business from the dangers of the digital era? An expert in information security in plain language explains the basic concepts of the threats lurking from modern computer technologies, as well as means of protecting valuable information, and shares useful recommendations based on long-standing experience.
Related to Omerta.com
Related ebooks
How to Beat Real-time Copyright Infringers Version 2.0: A Savvy Approach for Creative Professionals Rating: 0 out of 5 stars0 ratingsTechnology in Media Rating: 0 out of 5 stars0 ratings21st Century Privacy Rating: 0 out of 5 stars0 ratingsClose Protection: The Art of Protecting Others Workbook Rating: 0 out of 5 stars0 ratingsStay Cyber Safe: What Every CEO Should Know About Cybersecurity Rating: 0 out of 5 stars0 ratingsFirewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies Rating: 5 out of 5 stars5/5Your Safety and Privacy Online: The CIA and NSA Rating: 0 out of 5 stars0 ratingsFirewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5Techno Chimps Rating: 0 out of 5 stars0 ratingsManaging Information Security Breaches: Studies from real life Rating: 0 out of 5 stars0 ratingsEthical Hacking: How to Protect Your Network from Cyberattacks Rating: 0 out of 5 stars0 ratingsSecrets and Lies: Digital Security in a Networked World Rating: 4 out of 5 stars4/5How I Rob Banks: And Other Such Places Rating: 0 out of 5 stars0 ratingsSystem Administration Ethics: Ten Commandments for Security and Compliance in a Modern Cyber World Rating: 0 out of 5 stars0 ratingsKeeping Cyber Security Simple Rating: 0 out of 5 stars0 ratingsWifi Hacking Strategy & Ideas Rating: 0 out of 5 stars0 ratingsThe Darknet Superpack Rating: 0 out of 5 stars0 ratingsSecurity Sound Bites: Important Ideas About Security From Smart-Ass, Dumb-Ass, and Kick-Ass Quotations Rating: 0 out of 5 stars0 ratingsEasy Marketing Step-By-Step: Start Your Internet Business in The Next 5 Days Rating: 0 out of 5 stars0 ratingsOnline Safety: Scams, SPAM, Viruses and Clouds Rating: 0 out of 5 stars0 ratingsSurviving The Zombie Apocalypse: Safer Computing Tips for Small Business Managers and Everyday People Rating: 0 out of 5 stars0 ratingsMaking Passwords Secure Rating: 0 out of 5 stars0 ratingsThe Mom Friend Guide to Everyday Safety and Security: Tips from the Practical One in Your Squad Rating: 0 out of 5 stars0 ratingsBusiness as Usual Rating: 0 out of 5 stars0 ratingsThe Brainphone Prophecy Rating: 0 out of 5 stars0 ratingsUNHACKABLE : Your Online Security Playbook: Recreating Cyber Security in an Unsecure World Rating: 0 out of 5 stars0 ratingsIntelligent Safety: How to Protect Your Connected Family from Big Cybercrime Rating: 5 out of 5 stars5/5
Information Technology For You
How To Use Chatgpt: Using Chatgpt To Make Money Online Has Never Been This Simple Rating: 0 out of 5 stars0 ratingsSummary of Super-Intelligence From Nick Bostrom Rating: 5 out of 5 stars5/5Computer Science: A Concise Introduction Rating: 4 out of 5 stars4/5Linux Command Line and Shell Scripting Bible Rating: 3 out of 5 stars3/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5ChatGPT: The Future of Intelligent Conversation Rating: 4 out of 5 stars4/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Inkscape Beginner’s Guide Rating: 5 out of 5 stars5/5How to Write Effective Emails at Work Rating: 4 out of 5 stars4/5CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Core 1 Exam 220-1101 Rating: 0 out of 5 stars0 ratingsRaspberry Pi :Raspberry Pi Guide On Python & Projects Programming In Easy Steps Rating: 3 out of 5 stars3/5An Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Rating: 4 out of 5 stars4/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsHandbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5CompTIA Network+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam N10-008 Rating: 0 out of 5 stars0 ratingsData Analytics for Beginners: Introduction to Data Analytics Rating: 4 out of 5 stars4/5CompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsUnity Game Development Essentials Rating: 5 out of 5 stars5/5Supercommunicator: Explaining the Complicated So Anyone Can Understand Rating: 3 out of 5 stars3/5Panda3d 1.7 Game Developer's Cookbook Rating: 0 out of 5 stars0 ratingsCODING INTERVIEW: Advanced Methods to Learn and Excel in Coding Interview Rating: 0 out of 5 stars0 ratingsPractical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5FISMA Compliance Handbook: Second Edition Rating: 5 out of 5 stars5/5The Certified Fintech Professional Rating: 5 out of 5 stars5/5Learning Microsoft Endpoint Manager: Unified Endpoint Management with Intune and the Enterprise Mobility + Security Suite Rating: 0 out of 5 stars0 ratingsThe Core of Hacking Rating: 0 out of 5 stars0 ratings
Reviews for Omerta.com
0 ratings0 reviews
Book preview
Omerta.com - Paul Neumann
Paul Neumann
Omerta.com
Computer Security and Data Protection Manual for BIG BOSSES
© Paul Neumann, 2022
How do you protect your business from the dangers of the digital era? An expert in information security in plain language explains the basic concepts of the threats lurking from modern computer technologies, as well as means of protecting valuable information, and shares useful recommendations based on long-standing experience.
ISBN 978-83-8155-302-5
Created with Ridero smart publishing system
Contents
Omerta.com
Introduction
About the Author
About the Book
Those Magnificent Men in their Magnificent Offices
On IT specialists
Information security and its classification
Unauthorized access
Unauthorized data alteration
Loss of data
Access rights management
Data integrity
Data protection
Access rights
Passwords
How to create a strong password
Password storage
How many passwords are just right?
Password security levels
Your very own office octopus
Short analysis
The brain of the octopus
Every beast shalt have its own door
Say Password
Witness protection
Extra Terrestrials
Save ‘em all!
Uninterruptible Power Supply
Reliability
Back-up
Intrusion prevention
Computer viruses
Trojan horses
Burglary
Firewall
Firewall in a local network
Antibiotics
Epidemiology
Fake letters
Letters of happiness
Self-fertilization
Spam, spam, spam, spam…
Don’t flash, don’t reflect
Spam filtering
Scam
Guarding the mail
Encryption
Steganography
Cryptography
A simple classification of cryptographic methods
Pretty Good Privacy
Size matters
Electronic signature
How to use it
Corporate electronic mail
Dispose of the body
D-Day
File containers
Hidden file containers
Everything under control
Paperless office for the mindless secretaries
Burn after reading
Burn before reading
Biometrics
Spy mania
Digital wallet
Digital banking
Plastic cards
Digital currencies
Few words about traditional banking
What happens in the Internet stays in the Internet
Conclusions
Landmarks
Cover
Introduction
Oh yes, I know – you are the Big Boss. You don’t do the things when you pay others to do them for you. That’s why you don’t wash your car, you don’t shop (unless you need a new car or a new smartphone), you don’t dust your desk, and you don’t empty your garbage bin. But even you know there are things nobody will do for you.
Would you pay others to make love to your wife? Of course, you wouldn’t! Oh yes, I know that this is an intimate affair and you wouldn’t entrust it to the strangers. But why do you think that the security of your own information – any information, whether personal or business – is a less intimate affair?
Alas, my friend, the security of your information – or at least a clear understanding of what it is, and how do you achieve it – that’s YOUR PERSONAL BUSINESS. Of course, it’s no Cosa Nostra, although no Big Boss has any guarantee that their problems one day won’t become his problems, yet it’s certainly Cosa Tua.
Of course, you don’t want to fathom all the technicalities. You think that a Big Boss like you makes money for one and only purpose – to do only Big Business. It has, of course, some logic, but the security of your information is the Big Business. Take my word on that.
As you know, Don Vito Corleone never talked on the phone. He was afraid that his voice might be recorded, and then used to fabricate a number of fakes implicating him in bad things. It was a quite sensible an approach for those times, don’t take me wrong, but in our hi-tech world the old man wouldn’t survive a day. You know better than I that you can’t give up cell-phones, e-mail, computers-shmonputers, iPads-shmaypads, and the whole shebang of other electronic gadgets. We live in the world completely different from that of Don Vito, and his commandments don’t work here.
Another old man – Friedrich Nietzsche – said once what does not destroy me, makes me stronger
. The problem with all that damn modern technology is exactly opposite: first it makes us stronger, and then it destroys us. Or at least causes so many problems that it would better destroy us at once…
The situation of a modern Big Boss may be illustrated like this: He takes the seat in a super-fast non-armoured car (let’s say a Formula One bolid for one), and then he starts speeding at a crazy pace along a public highway. Speeding so much that it’s just a matter of time and pure luck, how soon he will encounter a sharp turn, where he will eject himself from the highway, and ram into a lonely pole, or a cow standing on the shoulder. That is why Formula One bolids are not allowed to ride on the public highways.
So, you have two options: either change to some economy class car that won’t fly on the curve whatever you do, or take care of your security while driving a vanity vehicle.
This book is about security measures.
About the Author
My name is Paul Neumann. I am an IT professional, and an expert in IT security. It should not concern you where was I born and where do I live, because I don’t live where I was born anymore; I live in many corners of our planet because my services are in demand in many places.
Why did I write this book, and to whom is it addressed? For the guys like you – the middle and top-level managers, as well as Big Bosses (and you are one of them, aren’t you?) Because there is a multitude of all kinds of books, manuals, and articles written for so-called security experts – there is no need for you to read them, since you will understand at best one term in ten, if not one in a hundred. But that’s not a problem. They were not written for you, and you do not need to understand them.
The problem is elsewhere. The problem is that most of those experts
, while reading those materials, understand at best three words in twenty. But they come to you and you entrust to them the most precious thing you have – information security. And that shit is taking care of your information. Not for long, though. Exactly until the first dramatic turn in your life, when someone out there will get an interest in your computer, your e-mail, your iPhone, and your SMS. And that interest won’t come out of sheer curiosity.
I assure you that in my professional life I deal with all kinds of firms, companies, offices, and corporations. And to be exact – with the ways all is organized there. Now I seldom organize information security directly – I have grown up since then. But I’m often invited as an expert to estimate the situation and outline it to the bosses.
And you know what’s the most interesting in all that? In nine cases out of ten those fellows were paying me top bucks just to hear something along the lines: C’mon, mate! Your company is all-right! Everything is OK, have a nice sleep!
And when I start to list, point by point, all the horrors I saw in their offices, they make sour faces and say: Paul, buddy, you’re of course an expert and all that, but we think you’re totally wrong.
I am wrong? So what the heck do I cash all that dough for? To tell them fairy tales about the perfect order in their offices?
Would you go to a plastic surgeon and pay him for the expensive examination just to hear something like C’mon, mate, you look great
? And you would leave his office perfectly happy, taking back to the real world all that’s yours – beer belly, eye bags, cellulite, and the ass as big as two airbags?
Of course, information security, just like the way you look, is your private business. But then what the heck for do you pay money to the experts? What the heck for do you pay that money to me? Sleuths don’t earn their sugar bones for giving their master an excited bark: Woof, woof, all is right, Master! Woof, woof, there’s nothing to look for! There are no villains around, thanks to the canine god!
Oh, no. Sleuths follow the trail with their noses down to the earth, without paying attention what lays around, until they find the bastard, catch his ass with their sharp fangs, and bring back to the master.
I am that sleuth. I make no compliments, and I don’t pay attention to what shit should I rake with my hands, but I don’t get my remuneration for nothing. But my conclusions and advices are addressed to you, manager, boss, director, or whatever else you are, Big Man. Because if I have found all that shit, it means you waste your money to pay your security specialists
. Because it means that they and IT security are totally incompatible.
Paul.Neumann@protonmail.ch
About the Book
After all, I got bored to repeat the same again and again. Each time I come to some company and spot there all the same breaches in the IT security, I have to do again the same procedure: put the management in front of myself and recite a little lecture. In a discrete, but tough manner. Something along the lines: Guys, if you don’t do something about this, they will grab your balls very, very soon.
When a surgeon sees the symptoms of an unpleasant and dangerous disease, he doesn’t munch the words. Why should I? My goal is to make you understand the problem. You see the breach in the IT security? No?
And that breach does exist!
Of course, in this most ideal of the worlds I’m not alone – an expert in IT security. What is more, I won’t have the guts to pretend that I’m one of the top hundred ones (although privately I hope so, but only hope). Quite a contrary, I will say that there is an army of top-quality IT security professionals for hire.
So, why the heck none of them works for you?!
Do you know?
I do.
Because you think it’s not a big deal. Because even a three-days long, pardon mon Canadien, clap, to you seems a bigger problem than the security of your information. That is why you don’t spend money on professionals, and that’s why you don’t bother to learn a tiny little bit about the crouching dangers, and how you can try to dodge them.
Please note that I don’t write completely avoid
, because it’s not real. What is real, that is the increase of the level of security by several magnitudes. But for that you need to know what’s and how’s.
And this book is written exactly to help you to understand whats
and hows
of the problems of the protection of your own security. So you won’t entrust the most private and infinitely precious you have to a college drop-out, whom you have hired part-time for 400–500 bucks to change cartridges in printers, explain accountants where to locate any key
on their keyboards, pinch your secretary’s ass (that’s not a part of his job contract, but he will do it anyway), demand money for system upgrade (his own home system that is), as well as take care of the system security. Among others.
Because this is how you have defined his job duties, right? Take care of all those computer thingies. Oh, yes – and security too, by the way…
So why have you not assigned all that burden just on the cleaning lady? The result would be pretty much the same. If not better.
So have in mind, my Big and Very Important Friend, that once you read this book, your life won’t be the same as before. You will become paranoid. Everywhere you go, you will sniff for hackers, and phishers, and carders, oh my! You will suddenly realise, how shaky are the foundations of your fate.
But I don’t want to make you paranoid. Quite a contrary, I want to put you in control of your own happiness. So you will be able to solidify and reinforce those foundations. And so you will always understand what the heck is going on.
Those Magnificent Men in their Magnificent Offices
Before I will start the difficult process of making the revolution in your mind, let us talk a little bit about all those magnificent, and simultaneously horror-striking scenes that open before me, each time I show up in an office, whose security I’m supposed to audit as an IT expert. Or the sleuth, if you wish.
And so, a Big Guy calls me and invites to his office for an audit and expert opinion. He has heard about me from his friends, and the friends of the friends, who have recommended me. What is interesting, he is not concerned (yet!) with the problems of security, but he knows that many of his Big Bossy Friends outsourced an IT expert – some Paul, who, like Nero Wolfe, solves the problems – and he too wants to outsource an expert. Outsourcing – that’s cool!
Maybe,
thinks the Big Guy, this sexpert will find some little hole in my business, enough to summon my little bosses and give ‘em little hell in front of him.
Or maybe,
the Big Boss continues to think, "this sleuth Paul will put his long sleuthy nose in all the dusted corners of my computers in vain, and eventually he’ll have to admit that he had sniffed nothing – no smell of fake receipts, no fine aroma of counterfeit seals, not even the awful stench of horrible gaps in the folders, through which one can see the guts of extraordinarily secret documents.
Yes, as I have already mentioned it, this Big Guy hired me exactly for that – to spend big money on an expert’s admission that in his office the state of the information security