- "Open Sesame" or Not? Use the Right Access Controls
- Apr 12, 2002
- "Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
|
- 2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
- May 2, 2011
- Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
|
- A Brief History of (Internet) Time: From the Beginnings of Malicious Code to Their Likely Future
- Jul 21, 2008
- Randy Nash looks at the complex relationship between computing power, the growth of the Internet, and the changes in malicious code over time.
|
- A Closer Look at the Fine Print in Privacy Statements
- Jun 11, 2004
- Most major companies (Novell, IBM, Oracle, HP, Microsoft, and so on) have very similar privacy statements. Zubair Alexander takes a closer look at the fine print in these statements: what type of data or personal information may be collected from you, and who it's shared with. What's in the fine print may surprise you.
|
- Advertising and Embedded Content
- Apr 14, 2009
- Greg Conti explores the risks associated with embedded content by focusing on Googleโs advertising network and Google Analytics.
|
- An Insider's Look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge
- May 15, 2012
- Brad Bowers takes an insider look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge that faces off hardened penetration testers against defending college teams in this annual cyber attack and defend competition.
|
- Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 1 of 3)
- Mar 16, 2009
- If you're the company's disaster-recovery planner, and you're caught unprepared for a natural disaster, are you at fault?
|
- Attacking and Defending the Internet with Border Gateway Protocol (BGP)
- Aug 25, 2008
- Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
|
- Authentication Auditing in Windows 2000
- Jul 29, 2005
- Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
|
- Botnets II: Emerging Threats, Tactics, and Defenses
- Dec 19, 2008
- Carolyn Meinel describes some of the more promising efforts to combat threats from botnets.
|
- Botnets, Part 1: Why They Strike and How to Defend Against Them
- Dec 5, 2008
- Carolyn Meinel describes the threats posed by increasingly sophisticated botnets and dives into some of the latest technology designed to stop them.
|
- Building a Custom JBoss Login Module
- Jun 10, 2005
- JBoss comes with very useful modules to define how to log in, but they're designed in a generic fashion to be examples or used in a very simple application. Marcus Zarra walks you through extending one of these modules to fit a custom requirement.
|
- Building a Roadmap for Securing Your Enterprise
- Nov 16, 2001
- This sample chapter from Maximum Security describes the basics of creating a pro-active information security plan, including the elimination of vulnerability points and the implementation of self-audit mechanisms.
|
- CCDC and the Tale of the Insider Threat
- May 24, 2010
- Brad Bowers discusses the value of including the threat of insider attacks in Collegiate Cyber Defense Competition (CCDC) events.
|
- Chained Exploits: Discover What Your Boss Is Looking At
- Apr 10, 2009
- Learn how to spy on your boss' net surfing habits — and protect yourself and your network from similar exploits.
|
- Chained Exploits: How Hackers Combine Attacks to Hack You
- Jan 27, 2010
- Security expert Andrew Whitaker explains the hacker mentality and points out how hackers combine multiple exploits to achieve their goals.
|
- Check Point CCSA Exam Cram: Defining Security Policy with SmartDashboard
- Jul 1, 2005
- This chapter will help you prepare for the CCSA exam, with a focus on SmartDashboard. Sample questions and comprehensive explanations will keep you up to date and equip you to pass the exam.
|
- Clickjacking: What You Need to Know
- Jan 5, 2009
- pdp explains how clickjacking attacks can hijack your mouse clicks in an attempt to trick you into giving away control of your privacy, your computer system, and possibly even your bank account.
|
- Computer Forensics: Tracking an Offender
- Nov 30, 2001
- Learn to collect and analyze evidence found in a compromised computer system.
|
- Computer Incident Response and Product Security: Operating an Incident Response Team
- Dec 17, 2010
- This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.
|