SansSQL

Tuesday, April 9, 2019

Best Security Practice In An Era of 5G and Cloud Platforms - A guest Post by Ralf Llanasas

Greater potential brings greater security responsibilities

The real world application of 5G is bound to trigger security issues that might not be evident in labs and test beds. As 5G promises customers, businesses, and service providers unparalleled potentials, so too does it hold unparalleled security lapses that will give way to cyber-attacks.

5G will envelop a vast array of technology platforms, from mobile devices to WiFi, Bluetooth, IoT infrastructures, etc., and security provisions need to cater to all of these. The technology’s low to zero latency also improves cloud performance, driving more industries, devices, and applications to become even more cloud dependent, if not completely.

An increasing number of functionalities across various industries are migrating to the cloud
More applications, more loopholes

A number of studies have recently raised red flags over 5G security gaps yet to be resolved. One such is the UK Government’s 5G Testbeds and Trials program conducted in collaboration with the University of Surrey’s 5G Innovation Center and three ongoing testbed programs -- AutoAir, 5G RuralFirst, and Worchestershire 5G.

Peter Claydon, project director of AutoAir, states that, “Since the age of 2G, mobile networks have been some of the most secure things on the planet, helped by the fact that each one is controlled by a single network operator.” He points out that this is different with 5G because the technology “opens up mobile networks allowing network operators to provide ‘slices’ of their networks to customers.” The result of such a scenario is therefore more open entry points for attacks.

In another similar study conducted by a team of researchers from the Technical University in Berlin, ETH Zurich, and SINTEF Digital Norway, it was found that 5G opens up glaring security lapses in Authentication and Key Agreement (AKA). AKA provides a security protocol used by phones to securely communicate with mobile networks. These security lapses in AKA over the 5G airwaves can allow cybercriminals to intercept calls and text messages on phones, as well as steal other sensitive data.

These studies, along with many others, have led to insights on the best security practices in an era of 5G and cloud computing. Before determining solutions, however, its best to zero in on what exactly the key challenges of 5G are.

Key security challenges

5G introduces a fundamental change in the relationship between networks, human machine interface, and end users. The key security challenges that attend such a reconfiguration include:
  • Exposure of critical facilities: With IoT networks woven through facilities such as power grids, elevators, door locks, water systems, autonomous vehicles, etc., 5G exposes our critical infrastructures to unprecedented risks.
  • Workload migration: Migration of workloads to 5G edge-computing exposes businesses to the combined risks of endpoint computing and cloud computing, given that the businesses need to monitor thousands of computing nodes in the process.
  • Hybrid computing eroding perimeters: With 5G, the idea of the perimeter as IT professionals know it, has been turned on its head. On 5G, different wireless networks will converge, and several aspects of business processes, health care, and the everyday lives of individuals will be locked into a system of hybrid computing where massive amounts of data are harvested to monitor and optimize odds and ends functionality.

Best Security Practices for the New Industrial Era


Some key target areas for security solutions
5G applications

The best way to address these security challenges is through unrelenting efforts from the onset, rather than waiting until these issues snowball into serious problems. With the lessons learned from the implementation of previous generations of wireless networks, businesses can put adequate preemptive measures in place to tackle these challenges. 

The difference, though, lies in what’s going to be increasing reliance on cloud platforms and 5G’s ‘slices’ of networks phenomenon. These expose loopholes, but they can be plugged to some extent with the right security practices.

The following is a rundown of some best practices for the new industrial era, where cloud platforms have become so significant:
  • Threat intelligence upgrades: This can serve both in risk mitigation and damage control. It can help prevent new attacks from recurring, and can also help prepare for threats as they evolve. It entails leveraging on Machine Learning and AI, and replacing traditional security architectures with more advanced security products.
  • Segmenting networks: Businesses can mitigate the cyber security risks which their critical resources are exposed to by using effective strategies to segment devices, apps, workflow and transactions.
  • Deploying compatible solutions: Putting together only solutions that are compatible with each other not only helps avoid further complications down the line, but also allows for the collection of data that can easily be used to identify and address risks across various parts of an organization.
  • Reinforcing access control: With more people and devices accessing 5G airwaves, businesses need to deploy a zero-trust principle where every single request for network access is thoroughly validated and authenticated.
  • Deploying MSSPs: Managed Security Service Providers (MSSP) give businesses a highly efficient and cost-effective option for outsourcing their 5G security responsibilities.
Final Words
5G and cloud computing is set to generate a new wave of innovation, taking productivity to new dimensions across various industries. The low to zero latency of the fifth generation mobile network technology enables a wide range of devices to stand alone, where previous networks caused them to remain tethered to other devices. This standalone capability is a result of cloud platforms, as most applications will be cloud dependent. 

However, this also takes cyber security threats to new heights, and businesses need to embrace the prospects of 5G with cautious optimism. By implementing the best security practices outlined above, businesses can position themselves to reap the tremendous benefits of 5G without exposing their assets to a slew of cyber threats.

About Ralf Llanasas
Ralf is a technology blogger, he writes about the latest mobile phones and technology news. He currently works at Whatphone.com.au as a content manager and his writings can be seen on various technology blogs. He also loves taking pictures when free.
Related Posts Widget For Blogger with ThumbnailsBlogger Templates

Friday, August 17, 2018

Tips to Move SQL Server Database from One Server to Another - SQL Tutorial by Rajan Singh

Leading organizations always look to find different solutions for high-performance data replication and secure storage environment. One such step is to move SQL Server database from one server to its updated version. In fact, when you migrate SQL server database, it provides an opportunity to scale the organizations data ecosystem efficiently at an optimum cost.

Why should you migrate SQL server database from one server to another?
  1. Advancement in Technology: Technology advancement may be a buzzword of today but it is essential to be up-to-date when it refers to Tech-world and to stay ahead, organizations need to accommodate the innovative style of Business Intelligence and ensure agility and higher productivity. Moving database from old SQL version to the latest and advanced technology provides users with an edge over the competition. 
  2. Reduce Cost: Moving SQL server database may be time taking and expensive initially, although the costs are lowered significantly in the long run 
  3. Achieve higher ROI: One of the significant reasons to switch from a lower version to a higher version or from a different database to SQL server database is to achieve a higher rate of interest on investments. 
  4. Consolidate data: Sometimes, data is scattered across different platforms. This is specifically valid in case of mergers and acquisitions. Then consolidating data on a single platform is conducive for users and easy to maintain for SQL administrators. 
  5. Secure Storage Environment: Security is a priority for any and all database and database security is ensured through protection rules and compliances. As per the survey conducted by National Institute of Standards and Technology, SQL server is most secure and least vulnerable database and hence the most preferred Storage environment.
Key Challenges in migrating SQL Database from one server to another

Once the organization decides about migration, the Administrator has to analyze the challenges in moving the database from one platform to another. Following key challenges may create hindrance in smooth movement:
  1. SQL Database Corruption
    Moving SQL Database from one server to another may lead to database corruption. 
  2. Database backup not update
    Many times, when database gets corrupt and backups are also not up-to-date, then the administrator is unable to restore from backup.
  3. Database backup not available
    If backup is not implemented and the organization’s database gets corrupt then the chances of database recovery are next to nil unless the organization employs a reliable and performing software like Stellar Phoenix SQL Database Repair.  
  4. Cost involved in moving Database
    Moving database from one Database Management System (DBMS) to another involves cost to be incurred in deploying a new server and the cost of data migration and the cost of old server which is rendered non-functional. 

    The downtime cost is also considered. Database will remain inaccessible during database migration from one server to another. 
Methods to move SQL Server Database from one server to another
  1. Backup SQL Database and Restore to another server
    The easiest solution is to take the latest backup of database and restore on another server. However, in most cases, SQL Admins and Backup Admins are different and there are chances that backup is not up-to-date. 
  2. Create a Duplicate Database in SQL Server
    If the earlier database is using SQL database and you want to move database to a higher version, then one of the methods is to create a duplicate copy of database in SQL server. However, Admins need to have more than 100% free space. This is not a feasible option and may lead to corrupt SQL Database. 
  3. Move SQL Database to New Server
    SQL Server Management Studio enables copying database from one server to another. To proceed further, you should get acquainted with:
    1. Source Server
    2. Destination Server
    3. Use Windows Authentication
    4. Using SQL Server Authentication 
    Steps to move:
    • Go to Object Explorer and launch SQL Server Management Studio and connect with the Source Server
    • Right click on the database to select the ‘Tasks’ option and select ‘Copy Database’ option ‘Copy Database Wizard’ screen displays. 
    • Fill in the details of Source Server and select the option ‘Use Windows Authentication’ followed by User ID and Password  
    • Next, fill in the details of Destination Server, and its Windows Authentication credentials
    • Checkbox for ‘Use the SQL Management Object method’
    • Select the Database from the available options and click on Copy option. Click Next to migrate SQL database to the destination server
    • Verify MDF files and Log file path on the destination server 
    • Copy all other jobs. If the SQL Management Studio fails to copy jobs then opt for the following:
      • System Event View
      • Local Path
      • Click on Windows Event Logs followed by Next button
      • To schedule the SSIS page, Click on Run immediately
      • Complete the Wizard message displays. Tick mark this option and click on Finish to complete the process. 
  4. Stellar SQL Repair to copy SQL Server Database from one server to another
    Deploying a trustworthy software to copy SQL Server Database. One such software is Stellar Phoenix SQL Database Repair software. This software allows users to repair a corrupt SQL server database. Once you have saved the repaired database as a New or Live database, then the next step is to deploy SQL Server Management Studio or SSMS. SSMS detaches the database from the source server and attaches it to the destination server.

    Reasons to deploy Stellar software for SQL recovery before using manual method are:
    • Database may get corrupt during migration. Stellar software repairs the corrupt MDF file and ensures smooth migration
    • In case MDF files or any other associated file is not detached properly, then the SQL Database will not give appropriate results
Conclusion
Error-free Migration of SQL Server database is possible when the different files associated with SQL Database are properly detached from the Source server and attached with the Destination server. However, there are times, when Admins are unable to detach the files and if these files are not detached from the source location, there is low possibility of getting these attached at the destination. In such circumstances, the best solution is to repair the database using Stellar Phoenix SQL Database Repair, save it as New Database and then move this SQL server database from one server to another. By following this procedure, SQL Administrators can ensure error-free and smooth data migration.

Checkout the MVP’s feedback about Stellar Phoenix SQL Database Repair is available here.

About Rajan Singh 
Rajan Singh is a Sr. Technology Consultant at Stellar Data Recovery Inc. and has published several article on MS Exchange emails, IOT, APIs, bug fixing etc.

Social Media Profiles
Google Plus: https://plus.google.com/101490924635563531512

Tuesday, August 14, 2018

Big Data Use Cases in the Manufacturing Industry - A guest Post by Renu Bisht

Big data is processing of data collected from various sources in different formats. Big data may contain sensitive information which is important for the organisation to make decisions. According to a research, the market value of the Big data will achieve around $1.1 billion by the next year. Today, many industries are using Big data, and companies which are not using are going through big data use cases to understand the benefits of stats in the organisation.

The insights of data are only possible because of Big data. Many industries are looking for the professionals which are skilled and knowledgeable about Big data so to become that person you need to enroll in courses like Big Data Certification Course which is available over the internet. Through this course, the person can learn and enhance his/her skills on Big data, without leaving personal systems. After completion of the course, the user gets a proved certification regarding completion.

How Big data assist manufacturers?
  1. By data tracing
  2. To determine the need of customer
  3. To determine the units need to be produced 
  4. Helps in the maintenance of equipment
  5. Helps in monitoring the production
  6. By maintaining the quality level
Why manufacturers need to use Big data cases?

In supply chain management, Big data helps the manufacturer to track the location of the product. Tracking of data is the primary need of the manufacturer. Why? It helps them to know the count of release, goods which are lost and are difficult to trace. The coordinates of the goods can be traced with the help of radio frequency transmission device and barcode scanners.

It provides the data related to the need and requirement of the customer. Prediction of the demand and assisting the product on time is the prominent reason behind the use of Big data. Forecasting is done when the supply chain is referred by companies and this helps in increasing the profit margin and improving the workspace. 

In product designing, the company analyses the behavior of customers with the Big data analytics. The result of the analysis is critical to understand, how to deliver in a profitable manner and on-time goods. 

Around $2billion revenue is generated by the TCS by just following the order/demands while manufacturing. With the help of analysis, the company predicts which product needs to be manufactured and which needs to be scrapped. In this way, the company makes strong contracts. 

In Quality Assurance, Big data predictions reduce the number of choices which in result reduce the time of testing and efforts. According to Intel’s survey, each manufactured chip had to go under 19,000 tests after production. So, to cut down the test time and giving emphasis on some important test was the biggest challenge faced by the Intel. 

The result was enormous, Intel saved around $3 million in manufacturing cost on a single line production of a chip. And the number may increase upto $30 million if Big data is used in the whole process of chip manufacturing.

In machine maintenance, the Big data helps to plan the maintenance of the machinery. It keeps the data regarding the machine operating time, past maintenance details, updation etc such that the machine runs smoothly and continuously. Sensors and other recognition devices help in collecting the data from the machine. Analysis helps the manufacturer in tracking the efficiency of machine continuously and to focus how it can be further improved.  

About Renu Bisht
Renu Bisht is a doyen of governing the digital content to assemble good relationships for enterprises or individuals. Renu is specialised in digital marketing, cloud computing, web designing and offer other valuable IT services for organisations, eventually enhancing their shape by delivering the stupendous solutions to their business problems. 

Social Media Profiles
LinkedIn: https://www.linkedin.com/in/renu-bisht-5b813759

Friday, June 15, 2018

Turn on fraud alerts in O365 MFA - An Additional security step

Multi-Factor Authentication (MFA) is a great feature for securing access to Enterprise applications but when a user receives a multi-factor authentication request when they aren’t expecting it, what they do? They can ignore the call or answer and hang up without pressing # to deny access to the person attempting to use their credentials.

This new feature "Fraud Alert" adds more value to the security by taking it to the next step by allowing the user to be more proactive about attempted attacks. They can answer the phone and enter their configured fraud alert code to report the attempted access. Not only it will deny the authentication taking place, but will block the user’s account so that additional authentication attempts are automatically denied without continuing to bother the user. It can also send an email notification to any configured email addresses so that they can take action, investigate, and change the user’s password. Once they have taken appropriate action, they can unblock the user’s account in the MFA Management Portal.

Turn on fraud alerts

  • Sign in to the Azure portal as an administrator.
  • Browse to Azure Active Directory > MFA Server > Fraud alert
  • Set the Allow users to submit fraud alerts setting to On
  • Select Save

Configuration options

Block user when fraud is reported: If a user reports fraud, their account is blocked for 90 days or until an administrator unblocks their account. An administrator can review sign-ins by using the sign-in report, and take appropriate action to prevent future fraud. An administrator can then unblock the user's account.

Code to report fraud during initial greeting: When users receive a phone call to perform two-step verification, they normally press # to confirm their sign-in. To report fraud, the user enters a code before pressing #. This code is 0 by default, but you can customize it

Note: The default voice greetings from Microsoft instruct users to press 0# to submit a fraud alert. If you want to use a code other than 0, record and upload your own custom voice greetings with appropriate instructions for your users.

View fraud reports
  • Sign in to the Azure portal
  • Select Azure Active Directory > Sign-ins. The fraud report is now part of the standard Azure AD Sign-ins report

Wednesday, June 13, 2018

Trouble in Opening MDF File because it Says SQL Error 5171? - A guest Post by Andre Williams

MS SQL Server is the most widely used and deployed database server in organizations. But, there are times when the SQL Server database gets corrupted due to various reasons. Error messages like SQL Error 1571 are also frequent with SQL Server. Let’s learn more about the SQL error 1571, its reasons and solutions.

Symptoms of SQL Error 5171:
With SQL Error 5171, you may face failures while logging in to SQL Server, restoring SQL database files, creating a tempdb database, and attaching MDF files successfully to the SQL Server database. Instead you will receive an error saying – “.mdf is not a primary database file. (Microsoft SQL server 5171)”

Possible Reasons for SQL Error 5171:
MDF file saves data in the form of pages, and each page occupies space of 8KB. The initial first page is the header page containing important database details such as signature, file size, compatibility, and much more. Rest all the other pages stores the actual data.
When the header page or related page of the file does not get recognized by the SQL Server database, it results in the SQL Error 1571 as the entire MDF is not considered to be a valid file.

Solution to Fix SQL Error 5171:
There are multiple reasons due to which SQL Error 5171 occurs. Some scenarios are mentioned below with their possible fix solution.

Scenario 1:
Usage of a mirror database in MS SQL Server by a user encounters the Error 5171, when database is set online by executing ALTER DATABASE command

Scenario 2:
When the SQL Server is upgraded to a latest or newer version, there are possible chances of Error 5171. As, you will have to first detach the database and then upgrade it to the new version. Hence, when you will try to attach it back to the MS SQL Server, it will fail to do so and error 5171 might encounter.

Below mentioned are the possible solutions for this error:

Method 1: For database mirroring
Step 1: First set, the principal database
Step 2: Use ALTER DATABASE MODIFY FILE command to modify the information.
Step 3: Now, stop the SQL server instance.
Step 4: Copy MDF and LDF files in a separate directory
Step 5: Now, restart SQL Server and attach the database files

Method 2: For attaching the database
Step 1: To troubleshoot the error, use the sp_attach_db command
Step 2: The command will attach the detached database files after upgrading is completed.
Please note: This method will work only in the case where you have used the sp_detach_db command to detach the database

Method 3: Automated Method to FIX SQL Server Error 5171
The above methods can easily remove the SQL Error 5171. However, if you still face the error after trying the above workaround methods, then you can opt for the automated solution. You can use Kernel for SQL Database Recovery tool, one of the most recommended methods by the database experts. The tool smoothly repairs and recovers all the database objects of corrupt or inaccessible MDF and NDF files. It flawlessly recovers large-sized MDF and NDF files.

Final Words:
You can always opt to use the manual methods for SQL recovery if you are an experienced database professional. But if you’re a na├»ve user of SQL database and you are not skilled enough to understand the errors of the database, then we suggest you restore your database files with the help of the automated solution.  
Hope the solutions help you to resolve the issues related to MS SQL Server. If you have any queries, please mention in the comments. We will get back to you with a possible resolution.

About Andre Williams
Andre Williams, with more than three year's experience in SQL related technologies, contributes articles, blogs, and how-to tips regularly.

Social Media Profiles

Ads