Sistema

Thu
20
Aug

Protected – but 0wned: A Real-world Example of Today’s Desktop Security Technology Limitations

Contributed by Anton Chuvakin

Here is my account of an incident story, which I initially mentioned here (http://chuvakin.blogspot.com/2007/04/answer-to-my-antivirus-mystery-ques...), with some details changed to protect the innocent, who was smart enough to call me for help.

This document is in PDF format. To view it click here.

Thu
20
Aug

Wireless Intrusion Detection Systems Including Incident Response & Wireless Policy

Contributed by Jeff Dixon

Wireless has opened a new and exciting world for many of us. Its technology is advancing and changing every day and its popularity is increasing. The biggest concern with wireless, however, has been security. For some time wireless has had very poor, if any, security on a wide open medium. Along with improved encryption schemes, a new solution to help combat this problem is the Wireless Intrusion Detection System (WIDS). In the security and wireless world this has fast become a major part of securing a network. The next sections will cover details of what a WIDS is and can do, along with incident response, and creating a wireless policy.

This document is in PDF format. To view it click here.

Wed
05
Aug

Security Management Considerations for Mobile Devices

Contributed by Brian Davis

Mobile devices have been in existence for many years now. This class of computers began with the invention of laptops and, within the past few years, smartphones have been introduced and has quickly gained popularity. Data, ranging from personal information, to sales data, to industry secrets can now be accessed from or taken anywhere in the world. This brings about security concerns for all organizations, whether nonprofit and for-profit. Just like stationary computers, desktops and servers, these devices can be compromised by an attacker. What are some steps organizations can take to mitigate the threat and utilize the productivity increase that mobile devices provide?

This document is in PDF format. To view it click here.

Sat
01
Aug

SharePoint Communication Protocol Hardening

Contributed by Robert Underwood

SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper will describe the typesof protocols that SharePoint is capable to using with an emphasis on NTLM communication. Within the discussion of NTLM communication an in depth review of the NTLM protocols the NTLM benefits will be reviewed and the current risk regarding NTLM vulnerabilities. In the analysis of the NTLM vulnerabilities this paper will discuss current mitigation techniques used to harden the NTLM communication protocols.

This document is in PDF format. To view it click here.

Thu
30
Jul

8 steps to protect your Cisco router

Contributed by Daniel B. Cid and restored from the old Infosecwriters archive.

Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Honeypots are modifying the way people think about security. Companies are spending thousand of dollars on new security devices, but forgetting the basic, the first line of defense: the border router.

Although a lot of people may think that routers don’t need to be protect, they are completely wrong. A lot of secure problems appear all time against this kind of device and most of them are vulnerable. Some information about some common security problems found on Cisco Routers, can be read on the text “Exploiting Cisco Routers”, available at: http://www.securityfocus.com/infocus/1734

Pages

Subscribe to RSS - Sistema