Security Management Considerations for Mobile Devices

Contributed by Brian Davis

Mobile devices have been in existence for many years now. This class of computers began with the invention of laptops and, within the past few years, smartphones have been introduced and has quickly gained popularity. Data, ranging from personal information, to sales data, to industry secrets can now be accessed from or taken anywhere in the world. This brings about security concerns for all organizations, whether nonprofit and for-profit. Just like stationary computers, desktops and servers, these devices can be compromised by an attacker. What are some steps organizations can take to mitigate the threat and utilize the productivity increase that mobile devices provide?

This document is in PDF format. To view it click here.


SharePoint Communication Protocol Hardening

Contributed by Robert Underwood

SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper will describe the typesof protocols that SharePoint is capable to using with an emphasis on NTLM communication. Within the discussion of NTLM communication an in depth review of the NTLM protocols the NTLM benefits will be reviewed and the current risk regarding NTLM vulnerabilities. In the analysis of the NTLM vulnerabilities this paper will discuss current mitigation techniques used to harden the NTLM communication protocols.

This document is in PDF format. To view it click here.


8 steps to protect your Cisco router

Contributed by Daniel B. Cid and restored from the old Infosecwriters archive.

Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Honeypots are modifying the way people think about security. Companies are spending thousand of dollars on new security devices, but forgetting the basic, the first line of defense: the border router.

Although a lot of people may think that routers don’t need to be protect, they are completely wrong. A lot of secure problems appear all time against this kind of device and most of them are vulnerable. Some information about some common security problems found on Cisco Routers, can be read on the text “Exploiting Cisco Routers”, available at:


Defense Against the DoS/DDoS Attacks on Cisco Routers

Contributed by Hang Chau and restored from the old Infosecwriters archives.

DoS/DDoS attacks are a virulent, relatively new type of Internet attacks, they have caused some biggest web sites on the world -- owned by the most famous E-Commerce companies such as Yahoo, eBay, Amazon -- became inaccessible to customers, partners, and users, the financial losses are very huge. On the other hand, if the international terrorist organizations use the DoS/DDoS to attack successfully the web sites or Internet systems of U.S. government and military, the results and losses will be disastrous and unimaginable.


Allowing Linux to Authenticate to a Windows 2003 AD Domain

Contributed by Thomas J. Munn, and restored from the archives.


Subscribe to RSS - Sistema