Et Cetera

Thu
10
Sep

Biometrics. What and how.

Contributed by Moustafa Kamal El-Hadidi

Humans have used body characteristics such as face, voice, gait, etc. from the day that mankind existed to recognize each other. Some characteristics don’t change over time and some do. And since each on has a unique characteristics that no other share we humans have thought of using that in our daily life, The main aim of using it after 9/11 is for security reasons. So what characteristics do we use? Are they accurate? Can we depend on them in our daily life routine?

This document is in PDF format. To view it click here.

Thu
10
Sep

Biometrics - The Wave of the Future?

Contributed by Gary Daniel

Will biometrics be a factor in our future? Of course it will, at least to the extent that it has been in our past history. We as citizens must decide upon the best methods to use and the best way to utilize this technology. Biometrics can be defined in several ways such as the study of measurable biological characteristics. In reference to Information Security it specifically applies to the automated use of physiological or behavioral characteristics to determine or verify identity.

This document is in PDF format. To view it click here.

Wed
09
Sep

Vulnerability Management

Contributed by Joseph Johann

With the proliferation of new attack vectors comes the need to be able to identify security vulnerabilities, rate them, and patch them as quickly as possible. This involves a systematic approach to managing this process. In this paper I will define the industry standards for vulnerability management. This includes the methods for identifying vulnerabilities and classifying their risks as well as the individuals involved in the process. I will also define the steps involved in performing a vulnerability assessment and some tools that can facilitate the process. Furthermore I will discuss sources of current vulnerability information and steps that can be taken to protect assets when a patch is not currently available. Finally I will discuss industry regulations that require organizations to have vulnerability assessments performed on a regular basis.

Tue
08
Sep

Best Practices for Hiring Penetration Testing Services

Contributed by Nathan W. Dickens

Tue
08
Sep

Hitchhiker's World Issue #10

Contributed by Hitch

Hitchhiker's world is an old blog created by an old ISW founding partner and friend. He sought out the most intriguing topics, and revealed them here every month. While these are old topics and articles, they are still a top hit on ISW today. Some of the contents from this blog include: Some Thoughts on RFID Technology, DNS Name Prediction with Google, and Distributed Honeypots!

This 2005 blog can be found here. To view it click here

Pages

Subscribe to RSS - Et Cetera