This section will demonstrate common information security problems mapped with OSI seven layers and evaluate the same for solutions to secure the organisation’s information resources. Layer 1 – Physical Layer The physical layer is responsible for the physical communication between end devices …
Log analysis is a responsibility that a secu-rity Analyst need fulfill with at most conviction in all organizations. If our is equipped with security devices like firewall, AV,VPN which is crucial to the organization and breach in any such devices affects the …
Introduction From this article we will go through network security as whole from basic to expert level. It will help you get better idea of Network Security. It’s just the reference for people who are interested in network security but don’t know …
In recent months, many readers became familiar with the term “Watering Hole,” used to describe an attack implemented to infect a website’s visitors. One could describe it as a “drive-by” exploit used to compromise legitimate websites. This method of attack is not …
Introduction You must have heard the name WordPress as it has become popular term across the social media world. I am not going deep into explaining what WordPress is but here is a short introduction to WordPress – It is a free …
The story so far Recently we’ve read in the news two huge attacks on two major social networks -Twitter and LinkedIn. These attacks were aimed to steal, from the two DBs, usernames, passwords and even session tokens of the social networks users. …
Who should read this article? Everyone that is interested in computer security and computer networking should read this article. Introduction If you run a network, a small or big one, you need a flexible and productive way to monitor it. You need …
Introduction Today’s organizations are facing major problems with Web Application Vulnerabilities. Many of such Web app vulnerabilities resulted in compromise of systems, including financial damage, theft of credit cards, loss of confidential data and reputational damage. Sometimes you just need to browse …
IRM.png Introduction Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective of the file location whether it resides “in” or “outside” the corporate boundaries. This happens as the permissions embedded inside …
header.png Remember Paris Hilton case? All her confidential data was compromised through her mobile-phone. Though it was not Bluetooth attack but your handheld devices can be one of the best targets for attacks and Bluetooth can be major part of it. The …