Archive for June 2014

Web Server Security and Database Server Security

                      Various high-profile hacking attacks have proven that web security remains the most critical issue to any business that conducts its operations online. Web servers are one of the most targeted public faces of an organization, because of the sensitive data they usually host.  Securing a web server is as important as securing the website or web application itself and the network around it. If you have a secure web application and an insecure web server, or vice versa, it still puts your business at a huge risk. Your company’s security is as strong as its weakest point.
Although securing a web server can be a daunting operation and requires specialist expertise, it is not an impossible task.  Long hours of research and  save you from long nights at the office, headaches and data breaches in the future.  Irrelevant of what web server software and operating system you are running, an out of the box configuration is usually insecure.  Therefore one must take some necessary steps in order to increase web server security.  Below is a list of tasks one should follow when securing a web server.
1. Remove Unnecessary Services
2. Remote access
3. Separate development / testing / production environment
4 .Web application content and server-side scripting
5. Permissions and privileges
6. Install all security patches on time
7. Monitor and audit the server
8. User accounts
9. Remove all unused modules and application extensions
10. Use security tools provided with web server software
11. Stay informed

12. Use Scanners
Monday, 30 June 2014
Posted by Unknown

Cyber Crime

Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example: hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes  when the illegal activities are committed through the use of a computer and the Internet.

Cyber crime is also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cyber crime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.

New technologies create new criminal opportunities but few new types of crime. Cybercrime ranges across a spectrum of activities. At one end are crimes that involve fundamental breaches of personal or corporate privacy, such as assaults on the integrity of information held in digital depositories and the use of illegally obtained digital information to blackmail a firm or individual. Also at this end of the spectrum is the growing crime of identity theft.

At the other end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet. These range from spam, hacking, and denial of service attacks against specific sites.
Wednesday, 25 June 2014
Posted by Unknown


Anyone who uses a computer needs to take computer security very seriously. You rely on your computer on a daily basis and will want to get the most out of your computer as possible. This means that you will also want to protect your computer from danger.

The internet is basically a large network of computers which are all connected together. 
This makes it very easy for viruses to spread from computer to computer very quickly. If your computer is connected to the internet then you are at risk and must install the right security software. One essential piece of security software is a firewall.

A firewall is a barrier between you and the internet. There are two main types of firewall: these are software or hardware firewalls. They filter the traffic from your home network and the internet. You need to use a firewall whenever you access the internet because it provides you with invaluable protection.

A firewall separates the internet from the home network. This splits the network in two which makes it easy to decide which network traffic you should trust. Computer firewalls will help to protect you from viruses, DOS (Denial of Service) attacks, hacking and worms. These threats are always around on the internet and that's why you must use a firewall to protect you.

A firewall will also help to protect your identity. Hackers may be able to access your computer and steal your personal information if you don't already have a firewall in place. Most firewalls will automatically start separating home and foreign network traffic. You might need to do some configuration before you can start using them but most of them will work out of the box with only minor configuration.

Thursday, 19 June 2014
Posted by Unknown
Tag :

Network Security

Network security is a method of preventing your computer network from the unauthorized user access, email spoofing, Trojan horses, denial of service, hacking, viruses, spyware and intruders etc. There are different securities mechanisms are being employed to protect the network. If a hacker gets control of your computer or network, he can send viruses or steal your company's confidential data. Similarly if any computer in your network is infected with the viruses or spyware, all other computers will also be infected if no proper security system has been implemented. Securing a network is most important job description of the network administrators, security specialists, network engineers and IT managers. You can secure your computer network by the following security methods.

Tuesday, 17 June 2014
Posted by Unknown

Ethical Hacking

Antimalware technologies and techniques to the rescue

Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love to break into top-level enterprise systems, but now they're also aiming low, taking advantage of the fact that each day employees bring their own devices to work and use them to access corporate networks.

The ability to detect and respond to advanced malware of all shapes and sizes is now mission-critical for enterprise information security professionals. InfoSec pros must rethink their strategies, and assess new technologies and techniques, to thwart high-level attacks, but they now cannot lose sight of the low-hanging fruit that is the employee-owned mobile device. This Insider Edition provides fresh thinking and new information on what antimalware detection and prevention is available to meet the modern malware threat. To best protect your organization and its unique assets.
Friday, 13 June 2014
Posted by Anonymous
Tag :

privacy and security

Privacy and Security

For many companies, collecting sensitive consumer and employee information is an essential part of doing business. It’s your legal responsibility to take steps to properly secure or dispose of it.  Financial data, personal information from kids, and material derived from credit reports may raise additional compliance considerations. In addition, you may have legal responsibilities to victims of identity theft.
Data Security

Many companies keep sensitive personal information about customers or employees in their files or on their network.  Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data.  The FTC has free resources for businesses of any size.
Monday, 9 June 2014
Posted by Anonymous
Tag :

server security

A Web server that supports any of the major security protocols, like SSL, that encrypt and decrypt messages to protect them against third party tampering. Making purchases from a secure Web server ensures that a user's payment or personal information can be translated into a secret code that's difficult to crack. Major security protocols include SSL, SHTTP, PCT, and IPSec.
Friday, 6 June 2014
Posted by Anonymous
Tag :


Protecting sensitive data is the end goal of almost all IT security measures. Two strong arguments for protecting sensitive data are to avoid identity theft and protect privacy.
The improper disclosure of sensitive data can also cause harm and embarrassment to students, faculty, and staff, and potentially harm the reputation of the Institute. Therefore, it is to everyone's advantage to ensure that sensitive data is protected.
Thursday, 5 June 2014
Posted by Anonymous
Tag :

Follow by Email

Total Pageviews

- Copyright © REDBACK COUNCIL - RISC -- Powered by Redback - Designed by Redback Council -