The Summary As the security landscape has become more threatening and dangerous and many organizations have fallen victim to attacks, breaches, and unrelenting news coverage, most have been forced to finally react in an effort to protect themselves. One of the first …
The below mentioned are the best practices to be followed for Linux Hardening. The consolidation is done through personal experience as well as through research on various articles from the Internet. The information mentioned can be varied to one’s organisational needs. This …
Capture The Flag (CTF) is an ethical hacking competition. This contest has taken its name from an outdoor game which consists of two teams and each team has to capture the flag of another team. In CTF’s you get to handle the …
The below mentioned are the best practices to be followed for firewall hardening. The consolidation is done through personal experience as well as through research on various articles from the internet. The information mentioned can be varied according to one’s organizational needs. …
What is BCP 38? BCP 38 also known as Network Ingress Filtering is defined by RFC 2487 as a technique which ensures that incoming packets are from the source which they claim to be from. The main aim of BCP 38 id …
This section will demonstrate common information security problems mapped with OSI seven layers and evaluate the same for solutions to secure the organisation’s information resources. Layer 1 – Physical Layer The physical layer is responsible for the physical communication between end devices …
Introduction While Oracle is designed “secure by default,” this article explores a variety of those defaults and administrative approaches that help to minimize vulnerabilities. Please remember that the strategies discussed here are presented as options to consider rather than definitive rules to …
DSCI (Data Security Council of India), a NASSCOM® body, has been setup as an independent Self-Regulatory organization to promote data protection, develop security and privacy best practices & standards and encourage the Indian industries to implement the same. DSCI has developed best …
Introduction Viproy is developed to improve quality of SIP Penetration Tests. It’s a collection of Metasploit Framework modules focused on SIP tests, it can be used with Metasploit Framework Github edition or Metasploit Framework Pro edition. It has 10 different modules to …
Log analysis is a responsibility that a secu-rity Analyst need fulfill with at most conviction in all organizations. If our is equipped with security devices like firewall, AV,VPN which is crucial to the organization and breach in any such devices affects the …