- Attacking the Spanning Tree Protocol
- Jun 4, 2008
- Conducting STP attacks is now within the reach of a wide population, thanks to the availability of point-and-shoot attacks tools. Fortunately, simple features widely available on a range of switches, such as BPDU-guard, provide effective measures against spanning-tree–based exploits.
|
- Attacks from Outside the Operating System
- Mar 29, 2002
- This excerpt from Andy Tanenbaum's Modern Operating Systems looks at some of the operating systems aspects of external threats, primarily focusing on viruses, worms, mobile code, and Java applets.
|
- Authentication
- Sep 21, 2001
- Authentication means proving that a user is who he claims to be – and then making sure he accesses only what he's allowed to. Mandy Andress discusses the types of authentication available to your organization and tells where they work best.
|
- Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
- Jun 25, 2013
- This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
|
- Basic Cisco IOS Software and Catalyst 3550 Series Security
- Jul 25, 2003
- Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
|
- Basic Virtual Private Network Deployment
- Jan 19, 2001
- Substantial interest in VPN has been created by concerns for privacy and data protection. You, the administrator must be aware of security concepts and network designs, and yet, customers require flexible network environments that will satisfy the needs ...
|
- Basics of the PIX Firewall
- Nov 7, 2003
- There are several areas of a network in a secure environment; the most common are the inside, the outside, and the DMZ firewalls that help divide and control traffic between them. Cisco has designed the PIX series of firewalls to be the primary devices for performing these functions. This chapter covers the basics of the PIX firewall areas that connect to the firewall—the trusted, untrusted, and DMZ.
|
- Been Cracked? Just Put PAM On It!
- Oct 26, 2001
- Pluggable authentication models (PAM) allow you to configure your Linux environment to meet your own particular security needs.
|
- Bluetooth Security Risks in Business
- May 9, 2008
- Nico Darrow tells you how to keep yourself safe from Bluetooth hackers.
|
- Botnets II: Emerging Threats, Tactics, and Defenses
- Dec 19, 2008
- Carolyn Meinel describes some of the more promising efforts to combat threats from botnets.
|
- Botnets, Part 1: Why They Strike and How to Defend Against Them
- Dec 5, 2008
- Carolyn Meinel describes the threats posed by increasingly sophisticated botnets and dives into some of the latest technology designed to stop them.
|
- Breaking Unwanted TCP Connections by Modifying Your Route Table
- Dec 6, 2001
- Kyle Cassidy and Richard Cardona give you a quick-and-dirty explanation on route tables, to help you take advantage of a free and simple way to block unwanted traffic to specific IP addresses or subnets.
|
- Broadband Routers and Firewalls
- Nov 17, 2006
|
- Building a Human Firewall: Raising Awareness to Protect Against Social Engineering
- Oct 27, 2006
- Thierry Wohnlich proposes an alternate view of information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discusses the role of the individuals in relation to information technology.
|
- Building a Roadmap for Securing Your Enterprise
- Nov 16, 2001
- This sample chapter from Maximum Security describes the basics of creating a pro-active information security plan, including the elimination of vulnerability points and the implementation of self-audit mechanisms.
|
- Building a Roadmap for Securing Your Enterprise
- Jul 13, 2001
- This sample chapter equips you with a roadmap for surviving the information security onslaught.
|
- Building Cisco IDS 3.0(3) Custom Signatures
- Feb 15, 2002
- Tuning your IDS to meet your specific network requirements is crucial for optimum protection of your network, as discussed in this article by Earl Carter.
|
- Building OpenSSH—Tools and Tradeoffs
- May 23, 2003
- This article updates the July 2001 Sun BluePrints OnLine article, "Building and Deploying OpenSSH for the Solaris Operating Environment." You'll learn about gathering the needed components, making compile-time configuration decisions, building components, and finally assembling the OpenSSH environment.
|
- Building OpenSSH--Tools and Tradeoffs, Updated for OpenSSH 3.7.1p2
- Jun 18, 2004
- This article contains information about gathering the needed components, deciding the compile-time configuration decisions, building the components, and finally assembling OpenSSH.
|
- Business Innovation from Israel's Masters of Espionage: The Intercept
- Jul 22, 2005
- In the inky darkness of the predawn hours, the Red Sea had turned choppy. The sun had yet to bathe the sea, known in Arabic as Al Bahr Al Ahmar, in its winter light. Fishing boats moored in the waters surrounded by Yemen, Saudi Arabia, and the Sudan rocked in the stormy darkness. Find out how Israeli intelligence intercepted a ship smuggling Palestinian arms in this sample chapter.
|