Cybersecurity

Threats and your Assets – What is really at Risk?

In this article we will cover some of the most important items you will need to consider when discussing, analyzing, designing or implementing a security posture within your place of business, or perhaps in a company you may be servicing. Considering that threats and their origins are constantly changing… shifting, we need to (as Security Analysts/Engineers) focus on what those threats are, where they originate from and what we can do about them as well as deal with their drift from the norm which was basically from being heavily focused on external threats to being in balance with internal threats. This article covers those details as well as why ‘Defense in Depth’ is so critical. We will also focus on Microsoft products (as well as other technologies) while doing so.

DHCP Server Security (Part 2)

In Part 1 of this two-part article we looked at the different types of threats faced by DHCP servers and outlined some general countermeasures for mitigating these threats. Part 2 continues with a list of practical steps administrators can follow and tools they can use to help secure their Windows 2000 and Windows Server 2003 DHCP servers.

Applying Windows XP Group Policy in a Windows 2000 Domain (Part 1)

In this two part article set we will cover the fundamentals of putting Windows XP securely into your network while utilizing the Group Policy Objects in Windows 2000. This two part article covers all the details on how to configure Windows 2000 and XP so that GPOs can be used. Part 1 covers the fundamentals and setup, Part 2 covers the Implementation. If you are not familiar with GPOs, I will cover some fundamentals in the beginning of Part 1.

DHCP Server Security (Part 1)

Part 1 of this two-part article looks at the different types of threats faced by DHCP servers and countermeasures for mitigating these threats. Part 2 will continue the discussion with a list of practical steps administrators can follow and tools they can use to help secure their Windows 2000 and Windows Server 2003 DHCP servers.

802.11i, WPA, RSN and What it all Means to Wi-Fi Security

We've all heard about the flaws and vulnerabilities in WEP, but the effort to create a standard that provides better security for wireless networks has been a long and bumpy one. The IEEE's 802.11i project has been implemented, in part, by the Wi-Fi Alliance's Wi-Fi Protected Access (WPA) and by the Robust Secure Network (RNS). What does it all mean to you, the wireless user or network administrator? In this article, we take a look at the new wireless networking security mechanisms and how you can use them to protect your Wi-Fi network.

Microsoft Windows and the Common Criteria Certification Part II

In today’s computer networks, it is important to start to concern yourself with another level of detail in security other than how to ‘harden a system’ by killing unneeded services or adding yet another service pack or hotfix to your system(s). In this article set, we will explore Common Criteria Certification, what it is and what it means. Part I of this article covered the fundamentals. In Part II of this article set we will look at how the Common Criteria is when implemented on a server at the EAL4 class level.

Securing Your Pocket PC

Busy executives and tech toy aficionados don't leave home without them – their Pocket PCs, that is. The ability to quickly check e-mail or pull up a Web site while on the go is invaluable, but what about the security implications of connecting to your home or office network with a mobile device? This article discusses security for handheld computers running Pocket PC/Windows Mobile 2003 operating systems.

Scroll to Top