Skip to main content

Week before Midterms

Presentation Tomorrow about False Guide Malware... will post the False Guide research tomorrow.
meanwhile check this website FalseGuide

Comments

Popular posts from this blog

Security Architecture

These are the 6 layers in the Security Architecture Physical (Hardware) Operation (System) Network  Host Application (Software) Data (Bits of Information) "Nothing is really secured. Security simply means setting up a defense against the 'most probable' attack. Since there are of infinite ways to penetrate all kinds of security" - Justin Pineda

Snort

Snort is an Intrusion Detection Service often integrated in a firewall, since most of the time the firewall is in control of the whole network of an organization, so if the firewall is easily breached then the whole organization could be at stake. Files in an organization can usually be accessed in a network, so if the firewall, which supposedly protects that networks gets breached who knows what kind of damages a hacker can do to an organization. In order to protect the firewall a layer of security is added which is the IDS - Snort, who is responsible to detect if there are any suspicious and harmful activities are done inside and outside the network. We are currently studying this as our Final Project for INFOSEC, and we just finished it today.

Security Concepts: General Security Concepts

The main focus of Security was on Prevention, however since there are many ways to exploit a certain system a formula has been made for Protection. Protection = Prevention + (Detection + Response) Prevention - Access Controls, Firewalls, Encryption Detection - Audit logs, Intrusion Detection System, Honeypots Response - Backups, Incident Response Team, Computer forensics (Detection + Response) - alert when prevention fails to provide ways to address the problem This formula is also known for "Operation Model of Computer Security" since every security technique and technology falls to either one of these three elements in the equation. Three ways an organization handles Protection is by first ignoring security issues which leaves everything by default; merely just because it's easier to set things up - leaving the organization very vulnerable. Secondly they handle it by providing "Host Security" - security for each devices like installing anti-virus...