- Securing LDAP Through TLS/SSL: A Cookbook
- Aug 16, 2002
- Learn how to set up the Sun Open Net Environment (Sun ONE) Directory Server software so that it can be accessed securely from command line tools.
|
- Unwitting Collaborators, Part 9: Steganography
- Aug 16, 2002
- A seemingly simple email conversation or family photo can hide devastating secret information. Learn how cyber thugs can use public web sites as vehicles for malicious communication by transmitting something that looks innocuous but contains hidden images or text.
|
- Security Risk Analysis with OCTAVE
- Aug 9, 2002
- What is the biggest threat to your organization's assets, and how could this impact your future? Use the OCTAVE SM (Operationally Critical Threat, Asset, and Vulnerability Evaluation) methodology to analyze your company's risks.
|
- Small Office Security
- Aug 9, 2002
- Large businesses, organizations, and even government institutions have often been targets of hackers. But have you thought that your small business may have data that's just as attractive to an intruder?
|
- Unwitting Collaborators, Part 8: Tunneling
- Aug 9, 2002
- A firewall or proxy server isn't very helpful if these barriers contain easily accessed gaps through which miscreants can grab or pass information. Learn how to block the holes.
|
- Unwitting Collaborators, Part 7: Denial-of-Service Attacks
- Aug 2, 2002
- Many supposedly "secure" sites - even including major Internet providers - have suffered from denial-of-service (DoS) attacks. Frank Fiore and Jean François tell you how to avoid being a victim.
|
- Ajay Gupta on Privacy, Security, and Air Conditioning
- Jul 26, 2002
- Security expert and co-author of Hack I.T., Ajay Gupta gives us his take on the complex relationship between privacy and security, the growing importance of security professionals in protecting America's critical infrastructure, and the joy and pain of depending on a handheld PDA.
|
- Developing a Continuity-of-Operations Plan
- Jul 26, 2002
- September 11, 2001 put a whole new spin on "rainy days" and heightened our awareness as to what really needs to be done to prepare for the unexpected. Learn about a methodology for developing an effective continuity-of-operations plan to meet any eventuality.
|
- Six Steps to Security Awareness
- Jul 19, 2002
- To combat the increasing trend of security breaches, corporations often deploy a one-two punch of strict policy and new tools. But security gains frequently fall short of expectations. One critical flaw is that end users are not trained to follow the revamped policies, and remain the weakest link. This training can be a far more cost-effective way to secure an enterprise.
|
- Unwitting Collaborators, Part 5: System and Application Vulnerabilities
- Jul 19, 2002
- We're all familiar with the threat of electronic viruses. But other malicious software can exploit invisible security holes in your network, applications, and even web browsers. Here's how to plug those gaps.
|
- How Safe is a .NET Passport Account in Windows XP Professional?
- Jul 12, 2002
- After the heavily promoted launches of the Microsoft Passport feature and Hailstorm, Passport has come under fire for being too easy to hack for credit card and logon data. Microsoft’s relative silence is not a good sign, either.
|
- Unwitting Collaborators, Part 4: Internal Threats
- Jul 12, 2002
- You’ve fully defended your organization from outside intrusions? Good. Now find out how to protect it from your own employees.
|
- Unwitting Collaborators, Part 3: Spyware
- Jul 5, 2002
- How can you find malicious programs that aren't obvious? Instead of coming into your system like a big, bad bomb, they simply sit quietly like a corporate assassin and steal your information. Find out how to prevent access by this "spyware."
|
- Communicating Securely in an Insecure Medium
- Jun 28, 2002
- Cyber security experts show how cryptology can protect your identity in the world of cyberspace. Learn what you need to know to thwart security breaches, ward off active and passive attacks, and avoid viruses and Trojan horses. Address the legal issues involved as you use cryptology to effectively combat attempts to cripple your system and compromise your intellectual property.
|
- Unwitting Collaborators, Part 2: Identity Theft and Impersonation
- Jun 28, 2002
- An identity thief can do all sorts of damage to your organization, just by stealing odd bits of information and insinuating himself past the company's security barriers. In this article, Frank Fiore and Jean François show how you can protect against this villainy.
|
- Raw Sockets Revisited: What Happened to the End of the Internet?
- Jun 21, 2002
- Could a hacker really crash the Internet? Could Windows XP be turned into a tool of mass destruction? Take a closer look at the startling alert that predicted the end of the Internet. In this article, Seth Fogie revisits the prophecy of doom surrounding the subject of Raw Sockets.
|
- Unwitting Collaborators, Part 1: Breakdown of the Human Firewall
- Jun 21, 2002
- "Social engineers" can bypass a company's protections with nothing more technological than a smile. This article explains how it happens and how to prevent it.
|
- Unwitting Collaborators: Series Introduction
- Jun 21, 2002
- American attitudes and behaviors make us easy targets for intruders and cyberterrorists. This article introduces a new series of studies on how to tighten up our security.
|
- Security Essentials Toolkit: Forensic Backups
- Jun 14, 2002
- Master two important tools of network security with these tutorials: Symantec Ghost, which helps you work with a compromised disk drive, and the freely available dd, which provides the capability to move data from one device to another.
|
- Secret Key Cryptography
- Jun 7, 2002
- Learn the basics of secret key cryptography. This excerpt discusses data-scrambling techniques used in early cryptographic systems and elaborates on the concepts employed in modern cryptosystems. It also describes well-known contemporary algorithms and discusses the security services enabled through secret key cryptography.
|