-
Nelson Ocampo commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 10 years, 1 month ago
take away:
“Don’t allow proprietary, insecure application protocols or legacy clear text protocols on your network”This week’s reading talks about switched and non-switched network environments and packet snipping.
Packet snipping tool is a very useful tool to use in tracing and analysing network transmissions and application issues, but…[Read more] -
Nelson Ocampo commented on the post, Progress Report for Week Ending, September 22, on the site 10 years, 1 month ago
IN THE NEWS:
Bash Code Injection Vulnerability
https://access.redhat.com/announcements/1210053The Bash code injection vulnerability could allow arbitrary code execution allowing attacker to bypass imposed environment restrictions. Certain services and applications allow remote unauthenticated attackers to exploit this vulnerability by…[Read more]
-
Nelson Ocampo commented on the post, NIST 800 60 V1R1 Guide for Mapping Types of Information and Information Systems to Security Categories, on the site 10 years, 1 month ago
Free webinar:
CYBERSPACE AS BATTLESPACE
DATE: Thursday, October 9, 2014 2pm-3pm EDTRegistration: https://www.blackhat.com/html/webcast/10092014-cyberspace-as-battlespace.html
In this presentation, Dr. Kenneth Geers draws a new world map, based on the premise that human conflict now often takes place on digital terrain, that many…[Read more]
-
Nelson Ocampo commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 10 years, 1 month ago
The first article “Footprinting: What Is It, Who Should Do It, and Why?” is related and can be a subset of the second article “Battle for the Internet: The War is On!”
Footprinting provides the company information about its resources and can help identify where weaknesses are develop processes to remediate them or minimize the potential risks…[Read more] -
Nelson Ocampo commented on the post, Progress Report for Week Ending, September 29, on the site 10 years, 1 month ago
In the news:
Apple ships a sevenfold security surprise, including iOS 8 and OS X 10.9.5
Apple ships a sevenfold security surprise, including iOS 8 and OS X 10.9.5Is This Free Wi-Fi Safe? Search the Map of Dangerous…[Read more]
-
Nelson Ocampo commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 10 years, 2 months ago
IN THE NEWS:
Google says Gmail credential dump not result of company breach
http://www.scmagazine.com/google-says-gmail-credential-dump-not-result-of-company-breach/article/371092/The credentials dump was not a result of a breach but was obtained through a combination of sources. If the same credentials are used across different websites…[Read more]
-
Nelson Ocampo commented on the post, Progress Report for Week Ending, September 22, on the site 10 years, 2 months ago
Reading one keypoint:
Your IP is one of the starting blocks for outsiders to gain information about you or your organization. They can gather information about your ISP and your approximate whereabouts.
The key in reconn is to observe and study the targeted system and look for patterns and weaknesses, may it be from the systems or personnel.…[Read more] -
Nelson Ocampo commented on the post, How You Get Hacked at Starbucks [INFOGRAPHIC], on the site Protection of Information Assets 11 years, 5 months ago
In the news:
—————Malware can be introduced to iPhones/iPads through the […]
-
Nelson Ocampo commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
Spain arrests suspect in massive cyberattack
http://www.cnn.com/2013/04/28/tech/spain-internet-attack-arrest/index.html?hpt=hp_t5How humble USB turned engineer into tech ‘rock […]
-
Nelson Ocampo commented on the post, Update on the WordPress "Brute Force" Attack – how one service provider is handling this issue, on the site Protection of Information Assets 11 years, 6 months ago
“We found a difference between the way the attack accesses WordPress and legitimate customers access WordPress”
I wonder what the discovery was.
-
Nelson Ocampo commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
This weeks SANS readings are about hashing, cryptography and the PKI technology. The explanation of what a hash is and how it works gave me a better understanding of how it relates to encryption. Hashing […]
-
Nelson Ocampo commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
In the news:
RSA: Is Software Security A Waste of Time?
http://securitywatch.pcmag.com/security/308760-rsa-is-software-security-a-waste-of-timeThis depends on the the company and the magnitude of the […]
-
Nelson Ocampo commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Chp 33 – I am aware that SAN holds incredible amounts of data and access should be restricted to authorized personnel only, but it is new information to me that SAN is susceptible to the same attacks methods used […]
-
Nelson Ocampo commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 7 months ago
In the news:
A Peek at the botnet evolution:
Botnets weren’t always malicious. They were originally designed to automate basics tasks on IRC and llowed IRC operators to link instances of the bot together […]
-
Nelson Ocampo commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Chap 31 talks about identity theft. The test/experiment conducted on identifying phishing was quite thorough and impressive. Their observation on the effectiveness different phishing formats based on logo, […]
-
Nelson Ocampo commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
In the news:
Identity Theft:
http://news.yahoo.com/woman-gets-prison-time-total-identity-theft-202030353.html
This is an interesting story of an identity theft victim and the nightmare she has endured for […]
-
Nelson Ocampo commented on the post, Testing Data Center Power Systems, on the site Protection of Information Assets 11 years, 7 months ago
The button was the emergency power (supply) shutdown of all the servers in the data center.
The beeping alarms were coming from the UPS (uninterruptible power supply) which is a battery powered device that […] -
Nelson Ocampo commented on the post, Week 9 Materials, on the site Protection of Information Assets 11 years, 7 months ago
“If encryption and forgery detection techniques are such powerful security mechanism, why aren’t they used
universally for all network communications?”
The author explanation is because we do not have a […]
-
Nelson Ocampo commented on the post, Weekly Question #7: Complete by March 27, 2017, on the site Protection of Information Assets 11 years, 7 months ago
I came across two articles that I found very interesting and informative.
1. Guerilla researcher created epic botnet to scan billions of IP addresses
It quite impressive what this underground researcher […] -
Nelson Ocampo commented on the post, Week 8 Materials, on the site Protection of Information Assets 11 years, 8 months ago
The Office for Domestic Preparedness Guidelines For Homeland Security June 2003 – Prevention and Deterrence
https://www.ncjrs.gov/pdffiles1/204340.pdf - Load More