A lot of questions are raised regarding the effect of auditing on the performance of systems.
Continue reading “Auditing System Impact on Performance – Windows”
A lot of questions are raised regarding the effect of auditing on the performance of systems.
Continue reading “Auditing System Impact on Performance – Windows”
Information may sometimes be disclosed to people for whom it is not intended. This usually does not bode well for information stake holders. Information may be disclosed either intentionally or unintentionally. Information can be disclosed unintentionally by social engineering, covert channels, malicious code etc. Accidental disclosure includes object reuse and emanation.
Continue reading “Gone with the Wind – Unauthorised Disclosure of Information”
The past few weeks the media has been abuzz with news about the threatened banning of the popular Blackberry service. What is the security row all about?
When a computer is compromised by an attacker he usually tries to elevate his privileges to that of the administrator or root user. The attacks that can be carried out by administrative users obviously have more far reaching effects and that is what the attacker wants.
One of the main principles of security is accountability. There are some problems associated with accountability, such as the difficulty in determining the security relevance of each user action. Another problem is searching through the collected data to find meaningful information.
The US Government Accountability Office (GAO) did a study on the benefits and risks of moving federal information technology into the cloud and released a report titled ‘Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing’ summarizing it’s findings.
Continue reading “Benefits & Risks of moving Federal Information Tech into the Cloud: A GAO Report”
At the CanSecWest security conference held earlier this year, IE, Firefox, Safari & iPhone were taken down within minutes. The fully patched systems went down to remote exploits which only goes to show how insecure internet facing systems are.
Continue reading “IE, Firefox, Safari & iPhone taken down at Pwn2Own”
The most general description of the CPU is that it is the brain of the computer. This is what everyone is familiar with. Let’s delve a little deeper.
As soon as the word ‘MPLS’ (Multi Layered Protocol Switching) is mentioned the term ‘MPLS VPN’ comes to everybody’s mind. This is soon followed by the thought of corporate offices spread across different cities being connected through an ‘MPLS VPN’. Your subconscious mind has also associated ‘confidentiality of my data probably using encryption’ to this whole concept as it is a VPN and VPNs are supposed to provide confidentiality and integrity of my data. Why else should they say ‘private’ in Virtual Private Networks?