Sistema

Fri
21
Aug

Introduction to Database Log Management

Contributed by Anton Chuvakin, Ph.D.

Database security have been capturing more and more attention in recent years, even though most of the security issues surrounding databases existed since the first day commercial database systems were introduced in the market in the 1980s.

This document is in PDF format. To view it click here.

Thu
20
Aug

Protected – but 0wned: A Real-world Example of Today’s Desktop Security Technology Limitations

Contributed by Anton Chuvakin

Here is my account of an incident story, which I initially mentioned here (http://chuvakin.blogspot.com/2007/04/answer-to-my-antivirus-mystery-ques...), with some details changed to protect the innocent, who was smart enough to call me for help.

This document is in PDF format. To view it click here.

Thu
20
Aug

Wireless Intrusion Detection Systems Including Incident Response & Wireless Policy

Contributed by Jeff Dixon

Wireless has opened a new and exciting world for many of us. Its technology is advancing and changing every day and its popularity is increasing. The biggest concern with wireless, however, has been security. For some time wireless has had very poor, if any, security on a wide open medium. Along with improved encryption schemes, a new solution to help combat this problem is the Wireless Intrusion Detection System (WIDS). In the security and wireless world this has fast become a major part of securing a network. The next sections will cover details of what a WIDS is and can do, along with incident response, and creating a wireless policy.

This document is in PDF format. To view it click here.

Wed
05
Aug

Security Management Considerations for Mobile Devices

Contributed by Brian Davis

Mobile devices have been in existence for many years now. This class of computers began with the invention of laptops and, within the past few years, smartphones have been introduced and has quickly gained popularity. Data, ranging from personal information, to sales data, to industry secrets can now be accessed from or taken anywhere in the world. This brings about security concerns for all organizations, whether nonprofit and for-profit. Just like stationary computers, desktops and servers, these devices can be compromised by an attacker. What are some steps organizations can take to mitigate the threat and utilize the productivity increase that mobile devices provide?

This document is in PDF format. To view it click here.

Sat
01
Aug

SharePoint Communication Protocol Hardening

Contributed by Robert Underwood

SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper will describe the typesof protocols that SharePoint is capable to using with an emphasis on NTLM communication. Within the discussion of NTLM communication an in depth review of the NTLM protocols the NTLM benefits will be reviewed and the current risk regarding NTLM vulnerabilities. In the analysis of the NTLM vulnerabilities this paper will discuss current mitigation techniques used to harden the NTLM communication protocols.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema