Sistema

Tue
16
Jun

Mobile Device Forensics

Contributed by Vicki Holzknecht.

Tue
16
Jun

Mitigation Techniques and Practical Implementation of EMET

Contributed by Ben Rain.

As the size of the internet and number of devices both on the personal and enterprise level increases, so does the number of cyber criminals. With so many devices, and so many vulnerabilities within these networks, how do we keep information safe? The answer is a endless amount of applications, physical devices, intrusion detection systems and the list goes on. Wouldn't it be nice if there was an application already loaded on most operating systems that could give a substantial amount of protection for our vulnerable programs but was not hard to implement?

The answer is EMET. EMET stands for Enhanced Mitigation Experience Toolkit and is a free Windows-based security tool that adds security defenses by using specific mitigation techniques to prevent exploits related to memory corruption. EMET defends against memory corruption vulnerabilities; EMET is easily implemented; and EMET has many practical uses.

Thu
14
May

Footprinting: What is it and How Do You Erase Them

Contributed by Eddie Sutton

The systematic and methodical Footprinting of an organization enables attackers to create a complete profile of an organization’s security posture. By using a combination of tools and techniques coupled with a healthy dose of patience, attackers can take an unknown entity (for example XYZ Organization) and reduce it to specific range of domain names, network blocks, and individual IP addresses of systems directly connected to the internet, as well as many other details pertaining to its security posture. Although there are many types of Footprinting techniques, they are primarily aimed at discovering information related to the following environments: Internet, intranet, remote access, and extranet. (the book)

This document is in PDF format. To view it click here.

Thu
14
May

Beginners Guide to Securing IPv6

Contributed by Dustin Paul

Internet Protocol version six (IPv6) is already running on most networks by default. The debate of whether or not IPv6 is going to stay around or not is over. Full implementation of native IPv6 networks may be very far in the future, or never; but IPv6 traffic is routing in, out, or to your network. This internet protocol has been around since the early 1990’s. Governments, large corporations, and industry leaders are implementing it globally. Information Security (InfoSec) analysts and managers must be pro-active in pursuing education and training on IPv6. Online learning resources are increasingly available. Along with improving expertise, InfoSec professionals must improve network visibility for IPv6 traffic. Using Network Intrusion Detection Systems (NIDS) and honeypots can help identify potential threats and reduce network impact. InfoSec professionals have the ability to mitigate network risks, after improving expertise and visibility

Wed
13
May

Storage Area Network Design Overview Using Brocade DCX 8510 Backbone Switches

Contributed by Paola Stone Martinez.

The design of a Storage Area Networks is a very complex process. There are different factors that have to be considered before setting it up. The engineers have to consider what the expectations from the users are and which topology could be more adequate for the company. Performance and availability are some characteristics mainly expected from users. Based on the company history, it is necessary to decide if a Core-Edge or Mesh topology would work better for the environment.

Pages

Subscribe to RSS - Sistema