Neuroprivilogy: The New Frontier of Cyber Crime

The first step of this discussion is defining a fancy term to help educate and describe this new phenomenon: Neuroprivilogy. As the name suggests Neuroprivilogy is constructed from the words neural (network) and privileged (access), and can be defined as the science of privileged access points’ networks. Using the neural network metaphor, an organization’s infrastructure is not flat, but instead, a network of systems (neuron=system). The connections between systems are access points similar to synapses (for neurons). Some of these access points are extremely powerful (i.e. privileged) while others are not. Regardless, access points should be accessed only by authorized sources.

In nearly every IT department, discussions about virtualization and debates about moving to the cloud usually end up in the same uncomfortable place, bookended by concerns about lack of security and loss of control. To help create a realistic risk/reward profile, we must first examine how the definition of privilege, in context of the identity and access management landscape, is evolving. We are no longer just talking about controlling database administrators with virtually limitless access to sensitive data and systems; we are talking about processes and operations that can be considered privileged based on the data accessed, the database being entered, or the actions being taken as a result of the data.

The concept of “privilege” is defined by the risk of the data being accessed or the system being manipulated. Virtualized and cloud technologies compound that risk, making traditional perimeter defenses no longer sufficient to protect far-reaching cloud-enabled privileged operations. Whether data is hosted, based in a cloud or virtualized, “privileged accounts and access points” are everywhere.

To gain a better understanding of the vulnerabilities impacting a privileged access points’ network, consider these Seven Neuroprivilogy Vulnerability Fallacies: Continue reading…

Related Posts

Be Confident Storing Information in the Cloud Over the past few years, information explosion has inhibited organizations’ ability to effectively secure, manage and recover data. This complexity is...
The top 10 best Android games of 2010 The history books will doubtless look back on 2010 as the year the whole Google mobile platform idea really took off. As the year closes out, the qual...
Animation in Honeycomb One of the new features ushered in with the Honeycomb release is a new animation system, a set of APIs in a whole new package (android.animation) that...
EFF Brief: “Privacy” Protections for Corporations Undermines Government Transp... EFF and a coalition of public interest groups urged the U.S. Supreme Court in an amicus brief Tuesday to reject so-called "privacy" protections for co...
How People Broadcast Their Locations Without Meaning To Smart phones include geotagging features that many people aren't aware of. People were up in arms this week about the privacy implications of news...
Anti SOPA/PIPA Protest: How it happened and what you can do The protest against Stop Online Piracy Act (SOPA) and Protect Intellectual Property Act (PIPA) has come and gone, but the fight is just getting starte...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Neuroprivilogy: The New Frontier of Cyber Crime -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*