Et Cetera


Technologies for Securing Healthcare Computer Networks

Contributed by Ming-Li Tabor

One celebrity’s photos were posted online. She uploaded her pictures to Apple iCloud. Therefore, her conclusion was that Apple iCloud was breached. Apple Company claimed their system was not breached. In the health care area, medical records are not the only data in the file. Patients use credit cards to pay bills. A patient can be like the celebrity and lose information, such as credit card numbers, social security number, or medical records. Patients could lose private information in a health care company also. These situations include intrusion by hackers, government or other corporates. Sometimes damage was from authorized users not using the data properly. The prevention will include cryptographic tools, access control, user authentication, intrusion detection, and firewalls. Examples and analysis of security technology can help to improve the network security of health care matters.


Too Easy? Finding personal Information on the World Wide Web has never been so easy

Contributed by Charles Hornat

I will be returning to the days where I contribute papers to help those interested in learning about Information Security or giving tips or pointers to those more experienced. I have been doing security now for over 20 years and I have seen security change its focus from networks and Internet to servers and workstations, to application based, to where we are today, data based. It seems the biggest challenge we, as security professionals have facing us, is identifying the “Crown Jewels” of our companies, and protecting them. This means a more focused approach to protecting actual data, not so much the network, the servers, the applications, or the Internet. Of course these things should not be neglected, and a layered approach is mandatory, but more focus needs to be made on the protection of the actual data than a system or network nowadays, in my opinion.


How the Lizard Squad Took Down Two of the Biggest Networks in the World

Contributed by James Rollins

During the 2014 Christmas holidays, millions of people all over the world were subjected to an unwanted gift. They sat down to play their new video game or watch a streaming movie on their Microsoft X-Box or Sony PlayStation, only to find that the online services of their respective system was unavailable. The blackout lasted for a couple days in Microsoft’s case, but the Sony service was down for more than a week. Microsoft’s X-Box Live and the Sony PlayStation Network had been successfully disabled by the Lizard Squad; a globally organized group of hackers, who had publicized their intentions on social media such as Twitter and Facebook for weeks prior to the attack.

This document is in PDF format. To view it click here.


NMAP and NESSUS Cheat Sheet

Contributed by Secguru and restored from the old Infosecwriters archive.

A quick reference sheet one can print out that contains the most common options of NMAP and NESSUS.

This document is in PDF format. To view it click here.


Are smart appliances safe?

Contributed by A. Michele Parrish

More and more homes are getting smart appliances. They have refrigerators, toilets, garage doors, thermostats and other appliances that are connected to the Internet and can be controlled from anywhere. The problem is can they also be controlled by anyone or just the homeowners? With the proliferation of smart appliances are homeowners exposing their homes and therefore their private lives to outsiders without knowing it? In this paper I explain what are smart appliances and how and why the market is growing, why they are desired, how smart appliances can be compromised and how consumers and vendors can make smart appliances more secure.

This document is in PDF format. To view it click here.


Subscribe to RSS - Et Cetera