-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
King, T. (2007). “Packet Sniffing In a Switched Environment”, SANS Institute InforSec Reading Room. The article introduces packet sniffing as largely a within network (“internal”) threat to unencrypted and poorl […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
McGreevy, J.P. (2002). “Footprinting: What Is it, Who Should Do It, and Why?”, SANS Institute Information Security Reading Room, Sans Institute. In planning an attack, the author instructs that “Footprinting” […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Week Four Reading: Mitchel, J. (2002). Proactive Vulnerability Assessments with Nessus, SANS Institute. Once setup and configured, Nessus is a powerful tool for applying signatures for detecting known […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Using Open Source Reconnaissance Tools for Business Partner Vulnerability Assessment (Young, S., 2014) . This article began with a warning about the legal risks of assessing the vulnerabilities of websites and […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
My takeaway from Chapter 2 – Enterprise Data Center Topology: It seems that a good network architecture structurally decomposes incoming and outgoing traffic into n-tier functional service areas (i.e. client […]
-
David Lanter wrote a new post on the site National Center of Academic Excellence in Cybersecurity 10 years, 8 months ago
The Institute for Business and Information Technology (IBIT) report – Barbarians Inside the Gate: Dealing With Advanced Persistent Threats authored by Gregory Senko, discussed advanced persistent threats (AP […]
-
David Lanter commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
A related article that came out today: Prolexic warns of spike in DrDoS(Distributed Reflection and Amplification Denial of Service ) attacks
Common networked devices: routers, hubs, printers, cameras, and sensors […] -
David Lanter commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
How to Report a DDoS Attack on the ICANN Blog (Internet Corporation for Assigned Names and Numbers)
“While ICANN’s role in mitigating these threats is limited, the Security Team offers these insights to raise […] -
David Lanter commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
In the News: Letter from PayPal Information Risk Management to Chairman of the Board of Internet Corporation for Assigned Names and Numbers: There appears to be anticipation that the introduction of new Internet […]
-
David Lanter commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
Vaca’ chapters 24-27, and the two SANS articles on Open/Closed Public Key and Cyrptographic Hash Functions: The readings left me pondering the complexity of “trust” in working with distributed certificate […]
-
David Lanter commented on the post, Malware Inforgraphic, on the site Protection of Information Assets 11 years, 7 months ago
Interesting information, wonderfully presented. Thank you!
-
David Lanter commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vaca Readings: A SAN can be critical infrastructure for facilitating efficient business continuity through centralized data management and protection. Like any critical IT resource, it needs to be planned and […]
-
David Lanter commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 7 months ago
News of the Week: Why Watering Hole Attacks Work
I found this item as I drilled down into news about the IE patches Microsoft is providing this week in part to address “…the series of watering hole attacks […] -
David Lanter commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vaca: This week’s readings covered a number of topics pertaining to the nature, benefits, and tradeoffs offered by alternative architectures and approaches to establish, leverage, and consolidate digital […]
-
David Lanter commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
News of the Week: I found reference to this item on AusCERT Week in Review, discussing efforts of Sophos, a data security provider, to bring attention to a Javascript vulnerability recently highlighted by a web […]
-
David Lanter commented on the post, Week 9 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vaca: This week’s readings provided a wide range of vulnerabilities and controls affecting IT Networks, Unix and Linux operating systems, Internet, intranets, LANS, Wireless networks, Cellular networks, […]
-
David Lanter commented on the post, Week 9 Materials, on the site Protection of Information Assets 11 years, 7 months ago
In the News: After reading Vaca’s Chapter 12 on Cellular Network Security I reflected on the fragility of our phone system, and came across an article by author of KrebsOnSecurity describing how he became the […]
-
David Lanter commented on the post, Week 8 Materials, on the site Protection of Information Assets 11 years, 7 months ago
PS: There appears to be something wrong with the system clock as it actually is now 6:02pm
-
David Lanter commented on the post, Weekly Question #7: Complete by March 27, 2017, on the site Protection of Information Assets 11 years, 7 months ago
David Lanter = tue87168
-
David Lanter commented on the post, Week 8 Materials, on the site Protection of Information Assets 11 years, 7 months ago
In the News: “Use of Cloud for Disaster Recovery, Backup and Desktop Set to Rise”
Article reports on a tudy of ~1300 IT professionals, and indicates adoption of Cloud Computing for Disaster Recovery (DR) is […]
- Load More