Sistema

Mon
24
Apr

BGP Hijacking and Mitigation Techniques

Contributed by Christian Matlock

Due to the nature of how BGP operates and how it was designed, a series of both unintentional mistakes or malicious attacks could take place to take down an entire autonomous system; or a more nefarious act of intercepting traffic and then routing it to the correct destination could also take place. In order to combat the trusting nature of BGP, a series of threat mitigation techniques have been implemented in order to protect BGP against attacks. This includes setting up BGP neighbor authentications, filtering BGP prefixes with AS path access lists, BGP time to live (TTL) security check, and the future resource public key infrastructure (RPKI) have been put in use.

This document is in PDF format. To view it click here.

Tue
11
Apr

Database Security

Contributed by Rodney Compton

As you read along you will learn much about the process in securing a database and all the elements or encounters you can and will face. The process in securing a database is complex; however, the potential harm from not properly securing a database is far greater.

This document is in PDF format. To view it click here.

Tue
28
Feb

Best practices for firewall configuration and maintenance in higher education

Contributed by Wendell Collie Jr.

This paper's purpose is to investigate best practices for firewall configuration and maintenance in higher education. It seeks to aid these learning institutions by providing an in-depth analysis of firewalls. In particular, this study will have compared various types of firewall technologies along with its features.

This document is in PDF format. To view it click here.

Thu
26
Jan

IP Telephony: Private Branch Exchange(PBX) vs. VoIP

Contributed by Billy Short

Internet Protocol telephony (frequently referred to as IP telephony) is an important concept in enterprise communications technology. IP telephony refers to all real-time applications over IP, which include many different instant messaging programs, video-conferencing, fax services, and Voice over Internet Protocol (VoIP). This document will focus mostly on the VoIP aspect of IP telephony.

This document is in PDF format. To view it click here.

Thu
19
Jan

Bring Your Own Device (BYOD), Best Practices in a Business Environment

Contributed by James S. McKinney

Bring Your Own Device (BYOD) is a trending business strategy that allows employees to utilize up-to-date electronic devices that they are already comfortable with. Employers benefit from increased employee satisfaction and the reduced cost of providing and maintaining electronic devices. The application of Best Practices can help a business to profit from the BYOD approach while managing the risk. Mitigating the risks associated with BYOD such as increased potential for data leakage and the exploitation of vulnerabilities introduces a host of challenges for the Information Assurance (IA) department. Establishing an acceptable device list that identifies allowed platforms and IOS versions serves to manage the diversity of end points and minimizes threats associated with outdated software. In addition a Network Access Control (NAC) should be implemented to authenticate users and validate device security.

Pages

Subscribe to RSS - Sistema