Sistema

Mon
09
Nov

Demystifying Security Enhanced (SE) Linux

Contributed by Abishek Singh

In this paper I will try to explain the philosophy behind the Security Enhanced Linux (SE Linux). I will however try to explain the concept with an example but to keep the length readable I will restrain myself to go into much of implementation details for e.g. commands and similar stuff.

This document is in PDF format. To view it click here.

Sat
31
Oct

Securing Your Nix System

Contributed by Tabitha O. Locklear

Fri
23
Oct

Creating VPN’s with IPsec

Contributed by Wilson Chance Hinchman

This paper will define the term VPN, explain for what and why VPNs are used. IPsec, which is vital to the functionality of VPNs will also be touched on. I will start by defining the term VPN, the acronym VPN stands for "Virtual Private Network”. This is an ambiguous term that gets thrown around a lot in the information technology industry. Many types of networks fall under the classification of virtual private network when taken out of context. For instance, frame relay networks, or private point to point WAN links could be considered virtual private networks.

This document is in PDF format. To view it click here.

Thu
22
Oct

System Center 2012 Configuration Manager: Compliance Settings

Contributed by John J. Rayborn

The intent of this paper is to provide a discussion on what compliance means as it relates to desired configuration, why it is important to organizations to ensure systems on the enterprise / corporate networks are compliant, and provide information on how an organization can look to ensure desired configuration compliance is being obtained. It is meant to be informational as well as educational for awareness purposes. I will be looking to explain how desired configuration for compliance is accomplished as well as provide information / screenshots on the use of the Compliance Settings component available in Microsoft System Center 2012 Configuration Manager. The paper will also provide information on how compliance standards requirements among various Industries can be accomplished through the use of System Center 2012 Configuration Manager.

Fri
09
Oct

Network Demilitarized Zone (DMZ)

Contributed by Jack Webb

In today’s information security, it is necessary to take advantage of all possible security options available to IT professionals. One of these options is network demilitarized zone or DMZ. A DMZ is the process of setting up a semi-secure network segment that houses all publicly accessible resource. This paper will cover the purpose of DMZ and its benefits in relation to security. It will cover the types and levels of DMS and security measure used within. This paper will also cover the differences between hardware and virtual DMZs as well as any commercial or vendor support for the creation of a DMZ.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema