Home > Articles > Security > General Security and Privacy

General Security and Privacy

RSS Feed Subscribe to this topic  RSS details

178 Items

Sort by Date | Title

"Open Sesame" or Not? Use the Right Access Controls
By Julia H. Allen
Apr 12, 2002
"Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
By Brad Bowers
May 2, 2011
Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
A Brief History of (Internet) Time: From the Beginnings of Malicious Code to Their Likely Future
By Randy Nash
Jul 21, 2008
Randy Nash looks at the complex relationship between computing power, the growth of the Internet, and the changes in malicious code over time.
A Closer Look at the Fine Print in Privacy Statements
By Zubair Alexander
Jun 11, 2004
Most major companies (Novell, IBM, Oracle, HP, Microsoft, and so on) have very similar privacy statements. Zubair Alexander takes a closer look at the fine print in these statements: what type of data or personal information may be collected from you, and who it's shared with. What's in the fine print may surprise you.
Advertising and Embedded Content
By Greg Conti
Apr 14, 2009
Greg Conti explores the risks associated with embedded content by focusing on Googleโ€™s advertising network and Google Analytics.
An Insider's Look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge
By Brad Bowers
May 15, 2012
Brad Bowers takes an insider look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge that faces off hardened penetration testers against defending college teams in this annual cyber attack and defend competition.
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 1 of 3)
By Leo Wrobel, Sharon Wrobel
Mar 16, 2009
If you're the company's disaster-recovery planner, and you're caught unprepared for a natural disaster, are you at fault?
Attacking and Defending the Internet with Border Gateway Protocol (BGP)
By Carolyn Meinel
Aug 25, 2008
Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
Authentication Auditing in Windows 2000
By Rick Cook
Jul 29, 2005
Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
Botnets II: Emerging Threats, Tactics, and Defenses
By Carolyn Meinel
Dec 19, 2008
Carolyn Meinel describes some of the more promising efforts to combat threats from botnets.
Botnets, Part 1: Why They Strike and How to Defend Against Them
By Carolyn Meinel
Dec 5, 2008
Carolyn Meinel describes the threats posed by increasingly sophisticated botnets and dives into some of the latest technology designed to stop them.
Building a Custom JBoss Login Module
By Marcus Zarra
Jun 10, 2005
JBoss comes with very useful modules to define how to log in, but they're designed in a generic fashion to be examples or used in a very simple application. Marcus Zarra walks you through extending one of these modules to fit a custom requirement.
Building a Roadmap for Securing Your Enterprise
By Greg Shipley
Nov 16, 2001
This sample chapter from Maximum Security describes the basics of creating a pro-active information security plan, including the elimination of vulnerability points and the implementation of self-audit mechanisms.
CCDC and the Tale of the Insider Threat
By Brad Bowers
May 24, 2010
Brad Bowers discusses the value of including the threat of insider attacks in Collegiate Cyber Defense Competition (CCDC) events.
Chained Exploits: Discover What Your Boss Is Looking At
By Andrew Whitaker, Keatron Evans, Jack B. Voth
Apr 10, 2009
Learn how to spy on your boss' net surfing habits — and protect yourself and your network from similar exploits.
Chained Exploits: How Hackers Combine Attacks to Hack You
By Andrew Whitaker
Jan 27, 2010
Security expert Andrew Whitaker explains the hacker mentality and points out how hackers combine multiple exploits to achieve their goals.
Check Point CCSA Exam Cram: Defining Security Policy with SmartDashboard
By Sean Walberg, Simon Desmeules
Jul 1, 2005
This chapter will help you prepare for the CCSA exam, with a focus on SmartDashboard. Sample questions and comprehensive explanations will keep you up to date and equip you to pass the exam.
Clickjacking: What You Need to Know
By pdp
Jan 5, 2009
pdp explains how clickjacking attacks can hijack your mouse clicks in an attempt to trick you into giving away control of your privacy, your computer system, and possibly even your bank account.
Computer Forensics: Tracking an Offender
By Jay G. Heiser, Warren G. Kruse II
Nov 30, 2001
Learn to collect and analyze evidence found in a compromised computer system.
Computer Incident Response and Product Security: Operating an Incident Response Team
By Damir Rajnovic
Dec 17, 2010
This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.

Page 1 2 3 4 5 Next >