Sistema

Sun
25
Nov

Managing Privacy Settings in Mozilla Firefox

Contributed by David Balaban
As with all other modern web browsers, Mozilla Firefox offers several features that help sending your data via the World Wide Web. By default, Firefox connects to Mozilla, Google and Yahoo servers. It is not recommended disabling this function, as it is very useful. This article will explain what other options you have to make an informed decision.
 
This document is in PDF format. To view it click here.

Sun
02
Sep

Effective Security Patch Management

Contributed by Awojana Tolulope
 

Thu
28
Jun

IPv6 Migration and Security Considerations

Contributed by Paul Zoratti

Thu
28
Jun

Security threats of Smart Device technologies (IoT)

Contributed by Justin Schomburg
Internet of thing security has become more and more prevalent and important in today’s day in age. IoT devices are getting smart and growing in number. This means that these devices will become prime target for hackers looking to use them massive botnet attacks like the Mirai botnet attack on Dyn and there will be increase number of hackers looking for back backdoor into your network and into your IoT devices. Challenges from over replicated unsecure devices to engineers lacks security responsibility can challenge the security integrity of these devices. The challenges can be mitigated with security techniques from both users and developers to secure you IoT devices.
This document is in PDF format. To view it click here.

Mon
21
May

Intrusion Detection and Prevention Systems Simplified

Contributed by Arthur J. Wyatt
This paper attempts to cover and discuss several aspects of Intrusion Prevention Systems and Intrusion Detection Systems. This paper attempts to do this is simple and basic language. Both systems are explained and defined according to the National Institute of Standards and Technology. Following that several techniques that can be used to install or implement them are described. The techniques described are hubs, port mirroring, test access points, and inline. During the discussion of each there are figures to depict and assisting in conveying how each implementation works. How each works along with the security or performance issues is discussed. The last thing talked about in this paper network segmentation and how Intrusion Prevention Systems and Intrusion Detection Systems could be used in conjunction to layer security and enforce network use and security policies.
 

Pages

Subscribe to RSS - Sistema