Et Cetera

Tue
01
Sep

Ebay OnLine Attack Jargon

Contributed by Aditya K Sood

This article relates to various online attacks that occurs through ebay and gets to core how the things are manipulated by the hackers to get work done of their own choice.This includes redirection attacks, phishing attacks and bypassing login attacks which are usually run on the net now a days.

This document is in PDF format. To view it click here.

Mon
31
Aug

Cybersecurity for Industrial Control System Network

Contributed by Mark Lewis

Industrial control systems (ICS) help run a large part of our nation’s critical infrastructure and industrial processes. The compromise of ICSs can have substantial negative impacts on our nation’s security, health, environment, and economy. Although we have been using ICSs in industrial processes for decades, securing these systems has become more important than ever. Over the past several years we have seen increases in both the number and sophistication of cyberattacks on industrial systems. In large part this can be attributed to the fact that many organizations have been increasingly connecting their ICS networks to their corporate networks, opening new doors for attackers to get in. This paper will explore the importance of protecting ICS networks and some best practices for connecting ICS networks to less secure corporate networks.

Mon
31
Aug

Deceptive Honeypots

Contributed by Suen Yek and Craig Valli

This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools have a place in modern network defence architecture.

This document is in PDF format. To view it click here.

Mon
31
Aug

The Value of Honeypots

Contributed by Lance Spitzner

Chapter 4 of the book "Honeypots: Tracking Hackers" by Lance Spitzner.

Now that we have defined honeypots and how they work, we can attempt to establish their value. As mentioned earlier, unlike mechanisms such as firewalls and intrusion detection systems, a honeypot does not address a specific problem. Instead, it is a tool that contributes to your overall security architecture. The value of honeypots, and the problems they help solve depend on how you build, deploy, and use them.

This document is in PDF format. To view it click here.

Mon
31
Aug

New Technology in the Armed Forces

Contributed by Robert Sauls

The United States Armed Forces is the main line of defense to protect our country from the threats of the world. If the armed forces are not well equipped, our soldiers can not fight and protect their country. With the advancements in technology, the armed forces have acquired many advanced weapons and vehicles to use to fight these threats to our country. Throughout this paper, I will discuss new advancements in weapons, vehicles, and other technology that the armed forces use to fight the enemy.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera