DDOS has been gaining acceptance in recent days due to troubled economics, religion and political reasons. This checklist serves as a basic/intermediate reference source for IS professionals who wish to have their critical IT assets protected against Distributed Denial Of Service Attacks commonly known as ‘DDOS’.
Gone with the Wind – Unauthorised Disclosure of Information
Information may sometimes be disclosed to people for whom it is not intended. This usually does not bode well for information stake holders. Information may be disclosed either intentionally or unintentionally. Information can be disclosed unintentionally by social engineering, covert channels, malicious code etc. Accidental disclosure includes object reuse and emanation.
Continue reading “Gone with the Wind – Unauthorised Disclosure of Information”
Security Threats through Social Networking Sites
Social Networking Sites such as Facebook, Twitter have become increasingly popular, but so has security issues specific to these sites. Continue reading “Security Threats through Social Networking Sites”
Licensed to snoop – The Blackberry Saga
The past few weeks the media has been abuzz with news about the threatened banning of the popular Blackberry service. What is the security row all about?
Malwares threats for Defence Establishments
Increasing use of IT in defense establishments is exposing them to the risks from cyber attacks. Alongwith conventional forces such as Army, Air force and Navy it is time that countries look at Cyberspace. A recent news article explains how the US defense was subject to malware attack from a flash drive. Continue reading “Malwares threats for Defence Establishments”
Your spy is sitting in your office corner
Do you know that your hi-tech copier machine is secretly capturing your confidential information? Not many of us know that. But the fact is hi-tech copiers and multi-function printers / scanners come with hard disks which retain the images of the documents copied. Continue reading “Your spy is sitting in your office corner”
Shock-Proof yourself against loss of your mobile phone
How badly would your daily activities be impacted if you lose your mobile phone? If you lost your mobile phone now, would you remember the telephone number of your spouse / relatives or friends to call them without your mobile phone? Would you be able to reconstruct all your contact numbers onto your new phone without tearing your hair? If you answer yes, welcome to the club of Minorities !! If you answer no, read on ….
Continue reading “Shock-Proof yourself against loss of your mobile phone”
A fool with a tool is still a fool
A good log management tool can be very effective in managing and ensuring security in an enterprise. However, the right tool can quickly become the wrong tool unless the organisation puts in the time and effort required to make the tool effective.
Here are a few best practices to ensure a successful implementation of a log management tool:
Tech Terminology Demystified – Rootkits
When a computer is compromised by an attacker he usually tries to elevate his privileges to that of the administrator or root user. The attacks that can be carried out by administrative users obviously have more far reaching effects and that is what the attacker wants.
Auditing in Solaris
One of the main principles of security is accountability. There are some problems associated with accountability, such as the difficulty in determining the security relevance of each user action. Another problem is searching through the collected data to find meaningful information.