Et Cetera

Tue
01
Sep

Hospitality IT Security

Contributed by Charles Hornat

This paper outlines some of the many IT security issues I have witnessed when taking over hotel/resort IT and security. These security lapses often times leave guest information free and open for the taking, usually requiring little to no effort to obtain. In my company’s experience (over a decade) of supporting some of the most prestigious hotels in the world, we see many of the same issues time and time again and I outline some of the more common issues we have come across.

This document is in PDF format. To view it click here.

Tue
01
Sep

Reverse Honey Trap - Striking Deep inside Online Web Antivirus Engines and Analyzers

Contributed by Aditya K Sood

Web based online anti viruses are used heavily for scanning malware files and providing the resultant output. There are number of online service providers which perform inline scanning of uploaded malware executables by the normal user or the victims. This process is based on the hierarchical functions and different steps opted to analyze the viruses and other worm activities. The infections occur dynamically when the executable becomes active in the environment. Everything is automated in this process as servers residing at the backend scan the executable and sent the information to other third party servers for secondary analysis or updating their record directly. That’s how the normal functioning of free online malware scanner works.

This document is in PDF format. To view it click here.

Tue
01
Sep

Ebay OnLine Attack Jargon

Contributed by Aditya K Sood

This article relates to various online attacks that occurs through ebay and gets to core how the things are manipulated by the hackers to get work done of their own choice.This includes redirection attacks, phishing attacks and bypassing login attacks which are usually run on the net now a days.

This document is in PDF format. To view it click here.

Mon
31
Aug

Cybersecurity for Industrial Control System Network

Contributed by Mark Lewis

Industrial control systems (ICS) help run a large part of our nation’s critical infrastructure and industrial processes. The compromise of ICSs can have substantial negative impacts on our nation’s security, health, environment, and economy. Although we have been using ICSs in industrial processes for decades, securing these systems has become more important than ever. Over the past several years we have seen increases in both the number and sophistication of cyberattacks on industrial systems. In large part this can be attributed to the fact that many organizations have been increasingly connecting their ICS networks to their corporate networks, opening new doors for attackers to get in. This paper will explore the importance of protecting ICS networks and some best practices for connecting ICS networks to less secure corporate networks.

Mon
31
Aug

Deceptive Honeypots

Contributed by Suen Yek and Craig Valli

This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools have a place in modern network defence architecture.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera