Et Cetera

Thu
14
Jan

Firewalls for the Home & Small Business

Contributed by Gordon Giles

A firewall can be in the form of hardware, software or a combination of the two. It is basically used to prevent, block, and keep out unwanted intruders from entering a network. This applies to a home, small business, or a large corporation network. A firewall monitors all of the incoming and outgoing traffic from a personal computer or a local area network. The majority of people ar enot afraid of the Internet connection being hacked by an outsider. The chances of suffering from some type of Internet hack are on the rise, especially when connected to the Internet using a cable modem or some type of broadband service.

This document is in PDF format. To view it click here.

Thu
14
Jan

Threat Detection Evolution: What Practitioners Need to Know

Contributed by Securosis

Prevention isn’t enough, whether you deploy it on the network or endpoints or both. It’s not clear that it ever was, but there is additional proof every day that adversaries cannot be reliably stopped. We see the beginning of the long-awaited shift of focus and funding, from prevention to detection and investigation. But security practitioners have been trying to make sense of security data for years to shorten the window between compromise and detection… largely unsuccessfully.

This document is in PDF format. To view it click here.

Fri
08
Jan

Using Digital Certificates to Identify Web Site Owners and Protect Against Phishing

Contributed by Edwin Aldridge

Phishing exploits the ordinary Internet user’s inability to be sure that a web site which they have been induced to visit is actually operated by the company or organization whose name appears on screen.

is deployed and used daily by every popular browser. Digital certificates can provide browsers with a reliable source of information about site owners which users can access via the padlock icon, although the information is not as useful as it might be and the padlock display is unintelligible.

This document is in PDF format. To view it click here.

Wed
06
Jan

Using Events-Per-Second as a Factor in Selecting SEM Tools

Contributed by Roberto Angelino,

Events Per Second, or EPS, as it is commonly referred to in the world of network security, is a measurement that is used to convey how fast a network generates data from its security devices (firewalls, Intrusion Detection Systems (IDS), servers, routers, etc.), and/or how fast an SEM product can correlate data from those devices. A savvy buyer will match the EPS his network is generating to those that can be accommodated by the SEM tool that he is purchasing.

This document is in PDF format. To view it click here.

Mon
04
Jan

Ethical Hacking: Rationale for a Hacking Methodological Approach to Network Security

Contributed by Regina D. Hartley

Pages

Subscribe to RSS - Et Cetera