Et Cetera

Mon
31
Aug

The Value of Honeypots

Contributed by Lance Spitzner

Chapter 4 of the book "Honeypots: Tracking Hackers" by Lance Spitzner.

Now that we have defined honeypots and how they work, we can attempt to establish their value. As mentioned earlier, unlike mechanisms such as firewalls and intrusion detection systems, a honeypot does not address a specific problem. Instead, it is a tool that contributes to your overall security architecture. The value of honeypots, and the problems they help solve depend on how you build, deploy, and use them.

This document is in PDF format. To view it click here.

Mon
31
Aug

New Technology in the Armed Forces

Contributed by Robert Sauls

The United States Armed Forces is the main line of defense to protect our country from the threats of the world. If the armed forces are not well equipped, our soldiers can not fight and protect their country. With the advancements in technology, the armed forces have acquired many advanced weapons and vehicles to use to fight these threats to our country. Throughout this paper, I will discuss new advancements in weapons, vehicles, and other technology that the armed forces use to fight the enemy.

This document is in PDF format. To view it click here.

Mon
31
Aug

Airids Architecture and Methodology

Contributed by Thomas Munn

The Goal: To make an Open-Sourced IDS that can intelligently react to threats without causing denial of service conditions, and reduce the workload of IDS analysts so they can concentrate on less mundane threats.

This document is in PDF format. To view it click here.

Mon
31
Aug

Application Security Cheat Sheet

Contributed by Hrishikesh Sivanandhan

Deploying application in a secure manner has become more critical today then ever before. Enterprises deploy several applications at very short notice. Business demands increased automation and more Internet enabled applications. Security is often considered after the application has been developed and is about to go live or in some cases even after the systems have gone live. This article takes a look at some of the critical factors that needs to be looked at for securing applications.

There are several security considerations that need to be met at different stages in the application life cycle.

This document is in PDF format. To view it click here.

Fri
28
Aug

Managing Internet of Thing Devices

Contributed by Luke Blum

The proliferation of network capable devices, collectively known as the Internet of Things, has provided the unprecedented opportunity for owners to manage and control their devices at any time and from any place. These devices are significantly different from the traditional computing devices that most people are accustomed to. Often smaller in size with limited processing resources, unique protocols were needed to allow these devices to operate effectively.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera