DDOS using NTP explained

Share This: DDOS using NTP explained. The NTP method was noticed in late 2013 affecting online gaming industry such as Riot’s League of Legends. Commonly attackers use botnets as their main tool for DDOS, however there are now many mechanisms in place to protect the business continuity and availability. NTP is widely used to synchronise […]
Continue reading…

 

VmWare Server setup guide with IE8, Windows XP/7 installing Backtrack

Share This: VmWare Server setup isn’t that too difficult however it may be a bit confusing for someone new to virtualization. I have created step by step guide by the end of which you should have your WM up and running. Step 1: Go to http://www.vmware.com/products/server/ to download the product. You need to register and […]
Continue reading…

 

Honeybots: HoneyBOT vs honeyd

Share This: Honeypot is a device on the computer network designed to capture malicious traffic. It disguises itself as real production system but contains dummy information. Often located behind the firewall inside the network and it is used to learn about intruders and detect vulnerabilities. Any connections to it on strange ports may mean that […]
Continue reading…

 

ITU X.800 brief overview

Share This: ITU X.800 is a security/threat model for end to end communication. Standard consists of Planes and Layers as well as security dimensions to provide very efficient Architecture and security for end to end communication. There are eight security dimensions addresses to network vulnerability which are listed below with brief explanation and a way […]
Continue reading…

 

ISO 27001 (17799) – brief Overview

Share This: Security of information is essential for reliability, and perhaps even the survival of the organisation. Every IT infrastructure uses data clusters for storing the information and they are often being targeted by attackers who want to infiltrate their resources for many different reasons, quite often financial. It’s not as it use to be […]
Continue reading…

 

Communication Security threats

Share This: Communication Security threats Communication will always require a certain security due to the sensitivity of information being stored. Networking can be explained really simple; all we have to do is send information from point A to the point B, although there are many of complex processes carried out while the information is being […]
Continue reading…

 

Security Auditing

Share This: Security auditing is not very appreciated process within any organization due to the fact that someone external is going to check already hired individuals and their skills. It may be a bit difficult to explain why security is so important and why certain mechanisms should be implemented especially for non-technical management. On the […]
Continue reading…