- An Executive's Information Security Challenge
- May 6, 2005
- Security isn't just an issue for network administrators to deal with. Everyone from the mail clerk to the executive board needs to be aware of information security issues. This chapter details the issues involved in information security as it affects executives.
|
- An Insider's Look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge
- May 15, 2012
- Brad Bowers takes an insider look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge that faces off hardened penetration testers against defending college teams in this annual cyber attack and defend competition.
|
- An Introduction to Snort: A Lightweight Intrusion Detection System
- Jun 15, 2001
- In this first of a two-part series of articles on Snort, Joseph Dries introduces you to this Intrusion Detection System and tells you the advantages of deploying it.
|
- An Overview of Computer Security
- Jan 3, 2005
|
- Analyzing MPLS VPN Security
- Oct 6, 2005
- VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
|
- Analyzing the Crossover Virus: The First PC to Windows Handheld Cross-infector
- Mar 8, 2006
- "Airborne" mobile viruses have been increasing in complexity at a surprising pace. In this article, Cyrus Peikari analyzes the new Crossover Trojan, which is the first malware that simultaneously infects both Windows PCs and Windows Mobile handheld devices.
|
- Anatomy Of A HackโThe Rise And Fall Of Your Network
- Jul 1, 2005
- There are myriad ways that a network can be compromised, and an administrator needs to be aware of them all (and anticipate new ways coming around the corner). This chapter will not to show how to attack something, but show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.
|
- Anatomy of an Intrusion Prevention System
- Oct 14, 2005
- Ultimately, security will be embedded within the network fabric, where traffic of all types (e.g., data, voice, video, graphics, fax) is not just routed from source to destination, but delivered with the necessary quality of service, and delivered securely. Intrusion Prevention Systems are the first step in this direction.
|
- Application of Denial of Service Attacks
- Jul 30, 2004
- Denial-of-Service (DoS) attacks can severely damage your business. In this article, Stephen de Vries explains the basics of DoS attacks, and how you can begin to protect yourself from them.
|
- Application Security for Visual C++.NET Developers
- Jul 18, 2003
- It's one thing to say you'll build secure applications, another thing entirely to know how to do so. Learn the basic techniques for improving the security of your .NET applications.
|
- Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 2 of 3)
- Mar 23, 2009
- Contingency planners must adopt those new technologies - or be held responsible for failure to do so. How do these issues affect your role in emergency planning for your organization?
|
- Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 3 of 3)
- Mar 31, 2009
- Leo A. Wrobel and Sharon M. Wrobel conclude this series with a discussion of an alarming fact (disasters are on the rise) and what might be an even more alarming conclusion for disaster recovery planners (yep, you're responsible).
|
- Are You Still Using RSH?
- Jan 30, 2004
- Running RSH is like leaving your house keys under the welcome mat. SSH offers the same convenience and functionality with far greater security, so why haven't you switched?
|
- Are Your Passwords Strong Enough? Advice from a Software Tester
- Nov 9, 2007
- Here's a look at passwords from the perspectives of a software tester, a business analyst, and a user.
|
- art_gore_outsourcing
- Jan 1, 2003
|
- As the Worm Turns: The Stuxnet Legacy
- Mar 14, 2011
- In his ongoing series about the intersections of technology and society, Larry Constantine (an interaction designer specializing in safety-critical applications) discusses the history of the malware known as stuxnet and offers suggestions on how it can be stopped.
|
- ASP.NET 2.0 Security
- Dec 10, 2004
- This chapter outlines some of the new security features included in ASP.NET 2.0. Many of these new features were added to address problems developers were forced to address in previous releases.
|
- Assessing Your Security Needs
- Jun 15, 2001
- Effective security is achieved through multiple layers of simple-to-understand-and-implement policies. Let security expert Joseph Dries show you how.
|
- Asymmetric Cryptography
- Dec 19, 2003
- Learn how asymmetric algorithms solve the shortcomings of symmetric algorithms. The authors of ".NET Security and Cryptography" also examine how asymmetric algorithms work at a conceptual level, and also provide a detailed analysis of RSA, which is currently the most popular asymmetric algorithm. Finally, they show how to use RSA in a typical program using the appropriate .NET Security Framework classes.
|
- Attacking and Defending the Internet with Border Gateway Protocol (BGP)
- Aug 25, 2008
- Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
|