Threats and protection methods

JIRA Protection Methods:
JIRA is used by Efinity in a way that ensures data processing in a secure manner providing due diligence in data integrity and confidentiality protection.
To ensure the highest level of security of information passing between our customers and JIRA system, we provide the following security measures:
  • Transport Layer Security v1.2 (TLSv1.2) - an encryption method that scrambles information while it is moving from one source to another in order to prevent the information being viewed or tampered with.
  • Encryption - a method of scrambling information while it moves from one source to another, that protects the contents.
  • Firewall - a method of keeping a network secure. Firewalls are commonly used to give users secure access to the Internet as well as to separate a company's public web server from its internal network.
  • Cookies - small text files that are sent to and stored on your computer, smartphone, tablet or other device for accessing the internet, whenever you visit a website or use on-line apps. They are used to maintain the integrity of your browsing  activities when you visit a website and can also be used to customize and so improve the individual customer experience.
Most Common Internet Security Threats:
JIRA is available to Efinity Clients via Internet therefore every User should be aware of common security threats that may impact JIRA's stability and functionality. Most prevalent Internet security threats are:
  • Viruses – a piece of software that can replicate itself and infect a computer without the permission or knowledge of the user. A virus can only spread when it is transmitted by a user over a network or the Internet, or through removable media such as CDs or memory sticks.
  • Trojans - a piece of software which conceals a payload (often malicious) while appearing to perform a legitimate action. Trojan horses often install "backdoor programs" which allow hackers a secret way into a computer system.
  • Malware - effects of malware can vary widely depending on what it is designed to do. Some cause little or no damage, while others can be very dangerous and deliberately target users who are online. It can gather personal or security information entered on the infected PC/laptop/phone. It can gain access to the device when the user is tricked into opening or running an infected attachment they have received from a seemingly legitimate mail, through an infected file they have downloaded or even by visiting an infected website.
  • Spam – electronic junk email. The amount of spam has now reached 90 billion messages a day. Email addresses are collected from chat rooms, websites, newsgroups and by Trojans which harvest users' address books.
  • Spyware - software that is secretly installed on a computer without the user's consent. It monitors user activity or interferes with user control over a personal computer.
  • Worms - self-replicating, malicious software program. Unlike a virus, it does not need to attach itself to an existing program or require user intervention to spread. It uses a network to send copies of itself to other computers on the network.
  • Keyloggers - a software program that is installed on a computer, often by a Trojan horse or virus. Keyloggers capture and record user keystrokes. The data captured is then transmitted to a remote computer.
  • Botnets - (also called a "zombie army") is a collection of software robots, or bots, that run automated tasks over the Internet. The term "botnet" is generally used to refer to a distributed network of compromised computers (called "zombie computers"). These "zombies" typically run programs such as worms, Trojan horses, or backdoors. Botnets are frequently used to launch Distributed Denial-of-Service (DDoS) attacks against websites. Newer bots can automatically scan their environment and propagate themselves using vulnerabilities and weak passwords.
  • Spoofing - an attack in which a person or program masquerades as another. A common tactic is to spoof a URL or website (see phishing).
  • Phishing - a common form of spoofing in which a phony web page is produced that looks just like a legitimate web page. The phony page is on a server under the control of the attacker. Criminals try to trick users into thinking that they are connected to a trusted site, and then harvest user names, passwords, credit card details and other sensitive information. Phishing is typically carried out by email or instant messaging. The email message claims to be from a legitimate source but when the user clicks on the link provided, he or she lands on the fake web page.
  • Pharming - an attack in which a hacker attempts to redirect a website's traffic to another, bogus website. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for resolving Internet names into their real IP addresses — the servers are the "signposts" of the Internet.
  • Vishing (Telephone or Voice Fraud)- social engineering based method over the telephone to gain access to private personal and security information. The term is a combination of 'voice' and phishing. It is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.
  • Denial-Of-Service Attack (DOS Attack) - an attempt to make a computer resource such as a website or web service unavailable to users. One of the most common methods of attack involves saturating the target (victim) machine with external communications requests.
    The machine then cannot respond to legitimate traffic or responds so slowly as to be rendered effectively unavailable. Attacks are often launched by networks of zombie computers or botnets. These are known as Distributed Denial-of-Service or DDoS attacks.
  • Every unreasonable User activity that may cause potential data leakage (e.g. revealing access credentials to third parties).
Threat Prevention Methods:
In order to keep data integrity and confidentiality protected during the JIRA usage, every User should be aware of all aforementioned security threats and act due to the following Safety and Security rules:
  • Use complex (hard to guess) password which is a combination of upper/lowercase letters and digits consisting of a minimum of eight characters.
  • Never reveal access credentials (User ID, password) to third parties.