Et Cetera

Wed
16
Sep

Browser Identification for Web Applications

Contributed by Shreeraj Shah

Browser Identification is not a new concept. With the focus having shifted to desktops from networks and servers, a topic such as remote browser identification needs to be revisited.

Browsers identify themselves to web servers in the USER_AGENT header field that is contained in requests sent to the server. Almost every release of browsers contains sloppy code that allows malicious servers or attackers to compromise user privacy and security.

This document is in PDF format. To view it click here.

Wed
16
Sep

Breaking Point: Forging Chaos and Destruction

Contributed by Jesus Oquendo

High tech wars nowadays seems to be a problem which many people overlook. While many would want to justify the means of fighting for privacy on the Internet for the sake of retaining privacy, others may use this same excuse to justify it for the means of using this shadow of privacy for committing criminal mischief for anything from financial gain, to jealousy, to experimentation. Sky's the limit when thinking of possibilities.

This document is in PDF format. To view it click here.

Tue
15
Sep

Importance of Individuals in Information Security

Contributed by A. Michele Parrish

This paper looks at the role of individuals in information security. The goal is to show that you and I are assets and liabilities when it comes to securing information. Many times we are the first line of defense whether it’s in choosing a good password, not falling prey to social engineering or in how we configure a firewall. Individuals must understand that company security is their responsibility and need to consider themselves an important component in protecting the company’s resources. They need to be trained properly in order to implement the correct measures to protect the confidentiality, integrity and availability of data. This paper will examine effective training methods and ways to motivate individuals to take security seriously.

This document is in PDF format. To view it click here.

Tue
15
Sep

The Lack of Attention in the Prevention of Cyber Crime and How to improve it

Contributed by Brett Pladna

This paper discusses the issues of cyber crime and what is being done to prevent it. Cyber criminals take advantages of vulnerabilities by using viruses, bots, etc to cause damage and/or maybe steal information. There are ways that this can be minimized by being aware of what the problems are. There are many problems but common ones are discussed. Not can these problems be solved on an individual or organization level but also on a global level. This paper will look at what cyber crime is and three topics that discuss the problems with cyber crime and how to prevent it.

This document is in PDF format. To view it click here.

Tue
15
Sep

What They Are and Who Should Use Them

Contributed by Brett Pladna

This paper will try to demonstrate the importance of computer forensics by describing procedures, tools and differences in the use for individuals/small organizations vs. large organizations. The procedures described deal with how to collect evidence and the laws that need to be followed for admission of evidence into a court room. The tools used are the basis for all tools that are available. Tools include, backing up data, authentication, decryption, file auditing, IP tracking, and data recovery and document examination. Smaller organizations might use a variety of these or all of these. The discussion of larger organizations discusses the need for digital evidence bags (DEB) due to their extreme efficiency. A digital evidence bag is used to store information from various applications such as the tools mentioned above.

Pages

Subscribe to RSS - Et Cetera