Sistema

Sun
21
Jun

The Increasing use of Digital Technology in Public Schools, Possible Threats, and Methods used for IT Security

Contributed by Larry Gene Hastings Jr.

This paper seeks to provide an understanding of the different computing needs being utilized in public school systems by identifying devices used to provide digital communication services to employees and students. By identifying what services are being provided, protocols and procedures for security can be identified as well. This will enable the reader to more fully understand what is needed to secure the underlying networks that make up the backbone for the devices used throughout a public school system.

This document is in PDF format. To view it click here.

Thu
18
Jun

Berkeley Packet Filters – The Basics

Contributed by Jeff Stebelton.

What are Berkeley Packet Filters? BPF’s are a raw (protocol independent) socket interface to the data link layer that allows filtering of packets in a very granular fashion1. BPF were first introduced in 1990 by Steven McCanne of Lawrence Berkeley Laboratory, according the FreeBSD man page on bpf2.

This document is in PDF format. To view it click here.

Tue
16
Jun

Mobile Device Forensics

Contributed by Vicki Holzknecht.

Tue
16
Jun

Mitigation Techniques and Practical Implementation of EMET

Contributed by Ben Rain.

As the size of the internet and number of devices both on the personal and enterprise level increases, so does the number of cyber criminals. With so many devices, and so many vulnerabilities within these networks, how do we keep information safe? The answer is a endless amount of applications, physical devices, intrusion detection systems and the list goes on. Wouldn't it be nice if there was an application already loaded on most operating systems that could give a substantial amount of protection for our vulnerable programs but was not hard to implement?

The answer is EMET. EMET stands for Enhanced Mitigation Experience Toolkit and is a free Windows-based security tool that adds security defenses by using specific mitigation techniques to prevent exploits related to memory corruption. EMET defends against memory corruption vulnerabilities; EMET is easily implemented; and EMET has many practical uses.

Thu
14
May

Footprinting: What is it and How Do You Erase Them

Contributed by Eddie Sutton

The systematic and methodical Footprinting of an organization enables attackers to create a complete profile of an organization’s security posture. By using a combination of tools and techniques coupled with a healthy dose of patience, attackers can take an unknown entity (for example XYZ Organization) and reduce it to specific range of domain names, network blocks, and individual IP addresses of systems directly connected to the internet, as well as many other details pertaining to its security posture. Although there are many types of Footprinting techniques, they are primarily aimed at discovering information related to the following environments: Internet, intranet, remote access, and extranet. (the book)

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema