Sistema

Mon
20
Jul

Cloud Computing: The Future is Containers

Contributed by Larry Gene Hastings Jr.

Wed
15
Jul

Salted hashes demystified

Contributed by Andres Andreu in 2005. Restored from the old Infosecwriters.com site.

This primer will provide a basic level explanation of how seeded (or salted) hashes of clear text data are structured / created. The original formalization of this concept comes from RFC-31121. This document is written so that an understanding of this type of functionality becomes possible to anyone with a good computer science foundation. For the purposes of this exploratory journey we will use the Secure Hash Algorithm (SHA-1) hashing algorithm (NIST FIPS 180-22, RFC-31743). The salting concepts apply to any one-way hashing algorithm including the MD-5 algorithm (RFC-13214).

This document is in PDF format. To view it click here.

Wed
08
Jul

Beginners Guide to Securing IPv6

Contributed by Dustin Stocks.

Internet Protocol version six (IPv6) is already running on most networks by default. The debate of whether or not IPv6 is going to stay around or not is over. Full implementation of native IPv6 networks may be very far in the future, or never; but IPv6 traffic is routing in, out, or to your network. This internet protocol has been around since the early 1990’s. Governments, large corporations, and industry leaders are implementing it globally. Information Security (InfoSec) analysts and managers must be pro-active in pursuing education and training on IPv6. Online learning resources are increasingly available. Along with improving expertise, InfoSec professionals must improve network visibility for IPv6 traffic. Using Network Intrusion Detection Systems (NIDS) and honeypots can help identify potential threats and reduce network impact. InfoSec professionals have the ability to mitigate network risks, after improving expertise and visibility.

Wed
01
Jul

The creation, processing, distribution, and management of Intrusion Detection/Prevention System rulesets

Contributed by Mike Richter.

Sun
21
Jun

The Increasing use of Digital Technology in Public Schools, Possible Threats, and Methods used for IT Security

Contributed by Larry Gene Hastings Jr.

This paper seeks to provide an understanding of the different computing needs being utilized in public school systems by identifying devices used to provide digital communication services to employees and students. By identifying what services are being provided, protocols and procedures for security can be identified as well. This will enable the reader to more fully understand what is needed to secure the underlying networks that make up the backbone for the devices used throughout a public school system.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema