Et Cetera

Mon
27
Jul

Responsibilities and Considerations in Secrets Management

Contributed by Adam Yarborough

Mon
27
Jan

Software Defined Environment: A View for the Security Practitioner

Contributed by Brian S. Rodgers

Thu
19
Dec

Social Engineering –The Human Side

Contributed by Mark Heckle
Social Engineering is one of the most widely used methods by cybercriminals to penetrate many networks across the globe. This type of attack is an easy way for criminals to infiltrate the defenses of any organization. Social Engineering attacks seem to be increasing every year due to the lack of awareness and knowledge of end-users. This sensitive data is collected through mobile devices, SMS, emails, or direct contact with a user. While prevention is almost impossible, this paper will examine the definition of social engineering, examples of Social Engineering, methods used by the attacker, the motivators of the attacker, and understanding why humans are easy prey to such attacks. By learning and understanding more about social engineering, it will go a long way in reducing the success of these penetration efforts.
 
 

Tue
26
Nov

Protecting Local Governments from Ransomware Attacks

Contributed by Kristy James

Tue
28
May

SSL Decryption How, When, and Why

Contributed by Brian May
decryption should be deployed in your enterprise environment, next generation firewalls (NGFW) must first be explained. In short a NGFW is a network appliance that packages together multiple security functions that range from firewall, IPS/IDS,
URL filtering, spam filtering, antivirus, anti-spyware, VPN gateway, etc. The key feature that separates NGFW from legacy port based firewalls is that the network
traffic is inspected at the application layer. Traditional port based firewalls could only apply security policies based on source, destination, and common port or port range. NGFW can identify applications such as DNS, Facebook, Teamviewer, or
Netflix and apply policy to the identified application or group of applications based on the organizations network acceptable use policy.
 
This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera