February, 2018

  • 26 February

    Using a Honeypot in Practice

    Using a Honeypot in Practice

    Honeypot in Practice: A honeypot is ideally suited to get a clearer picture of the activity on or around the critical systems in your environment. The common use of honeypots is to look like a legitimate resource so as to be indistinguishable from the real thing. This will subject both …

  • 25 February

    Biometrics: Installing Biometric Devices

    Biometrics: Installing Biometric Devices

    Biometrics: Biometrics systems use some kind of unique biological trait to identify a person, such as fingerprint, patterns on the retina, and handprints. Some methods that are used include hand scanners, retinal scanners, facial recognition applications, and keystroke recognition programs, which can be used as part of the access control …

  • 24 February

    Directory Traversal/Command Injection

    Directory Traversal Command Injection

    Directory Traversal and Command Injection: If an attacker is able to gain access to restricted directories (such as the root directory) through HTTP, it is known as a directory traversal attack. If the attackers can gain access to the root directory of a system (which is limited from all but …

  • 23 February

    Malicious Add-Ons

    Malicious Add-Ons

    Malicious Add-Ons: There are any numbers of add-ons that have the potential to harm a system. Some do so unintentionally through poor programming, and some are truly malicious add-ons; the difference between them is intent. Consider a Java applet, for example. This is a small, self-contained Java Script that is …

  • 22 February

    Antimalware

    Antimalware

    Antimalware: To keep all hosts safe from malware, there are a number of actions you should take at minimum: Install Antivirus Software: Access Control, Authentication, and Authorization, Should be installed and definitions kept current on all hosts. Antivirus software should run on the server as well as on every workstation. …

  • 21 February

    Smart Cards

    Smart Cards

    Smart Cards are generally used for access control and security purposes. The card itself usually contains a small amount of memory that can be used to store permissions and access information. Smart cards are difficult to counterfeit, but they are easy to steal. Once a thief has a smart card, …

  • 20 February

    Wi-Fi Encryption

    Wi-Fi Encryption

    Wi-Fi Encryption requires a short discussion of its own. In such an environment, the clients and the access point share the same key, using symmetric encryption, and RC4 was mentioned for this purpose earlier in articles. Since all the clients and the access point share the same key, this is …

  • 19 February

    How to Stop a Virus or Worm That Is Out of Control

    How to Stop a Virus or Worm That Is Out of Control

    How to Stop a Virus or Worm that is Out of Control: A large private university has over 30,000 students taking online classes. These students use a variety of systems and network connections. The instructor of this university are being routinely hit with the Klez32 (specially, in this case, the …

  • 18 February

    Pretty Good Privacy

    Pretty Good Privacy

    Pretty Good Privacy (PGP) is a freeware email encryption system. PGP was introduced in the early 1990s, and it’s considered to be a very good system. It’s widely used for email security. PGP uses both symmetrical and asymmetrical systems as a part of its process; it is this serial combination …

  • 17 February

    The Patriot Act

    The Patriot Act

    The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 was passed largely because of the World Trade Center attack on September 11, 2001. This law gives the U.S government extreme latitude in pursuing criminals who commit terrorist acts. The …