Featuring 25 of the Most Popular Papers as of August, 2014
Introduction to IP Spoofing
by Victor Velasco - - November 21, 2000 in Threats/Vulnerabilities
This paper describes the use of IP spoofing as a method of attacking a network in order to gain unauthorized access.
Security Vulnerabilities and Wireless LAN Technology
by Heather Lane - - May 17, 2005 in Wireless Access
Wireless local area network systems (LANs), also referred to as Wi-Fi can be found everywhere. Since their introduction in the mid 1990s, they have proliferated among home users and have taken over organizations whether or not they are authorized.
An Overview of Different Authentication Methods and Protocols
by Richard Duncan - - October 23, 2001 in Authentication
This overview will generalize several Authentication Methods and Authentication Protocols in hopes of better understanding a few options that are available when designing a security system.
Security for Critical Infrastructure SCADA Systems
by Andrew Hildick-Smith - - August 24, 2005 in Information Warfare
Supervisory Control and Data Acquisition (SCADA) systems and other similar control systems are widely used by utilities and industries that are considered critical to the functioning of countries around the world.
Creating a Comprehensive Vulnerability Assessment Program for a Large Company Using QualysGuard
by Tim Proffitt - - March 31, 2008 in Auditing & Assessment
With todays global marketplace, companies cannot afford to tarnish their reputation with a public security incident. Corporations can suffer major financial losses if a security incident is encountered in the business. The fear of revenue loss should motivate companies to begin taking proactive measures against vulnerabilities in their infrastructure. The concept of vulnerability assessment is a critical process that should be followed in any organizations as a way to identify, assess and respond to new vulnerabilities before those vulnerabilities become a threat.
Detecting and Preventing Unauthorized Outbound Traffic
by Brian Wippich - - October 29, 2007 in Intrusion Detection
This paper will describe some of the risks associated with outbound traffic, methods for securing this traffic, techniques for circumventing these controls, and methods for detecting and preventing these techniques. There is no way to eliminate all risk associated with outbound traffic short of closing all ports. However, a good understanding of these risks should allow you to make informed decisions on securing this traffic.
Hacking: The Basics
by Zachary Wilson - - April 4, 2001 in Hackers
The basics of IT security for less security conscious IT professionals and end-users on exactly who is out there and what they are doing to get in.
Tracking Malware With Public Proxy Lists
by James Powers - - January 27, 2011 in Malicious Code
The Web was born on Christmas Day, 1990 when the CERN Web server (CERN httpd 1.0) went online. By version 2.0, released in 1993, CERN httpd, was also capable of performing as an application gateway. By 1994, content caching was added. With the publication of RFC 1945 two years later, proxy capabilities were forever embedded into the HTTP specification (Berners-Lee, Fielding, & Frystyk, 1996).
Risk Assessment of Social Media
by Robert Shullich - - May 16, 2012 in Digital Privacy
According to a September 2011 survey, 63% respondents indicated that employee use of social media puts their organizations security at risk" while 29% "say they have the necessary security controls in place to mitigate or reduce the risk" (Ponemon Institute, 2011).
Three Different Shades of Ethical Hacking: Black, White and Gray
by David Hafele - - May 2, 2004 in Hackers
Corporations and other entities are faced with the unenviable task of trying to defend their networks against various types of intrusive attacks.
Understanding IPS and IDS: Using IPS and IDS together for Defense in Depth
by Ted Holland - - May 2, 2004 in Intrusion Detection
Over the past few years many papers and books have included articles explaining and supporting either Intrusion Detection Systems (IDS) or the newer technology on the security block, Intrusion Prevention Systems (IPS).
The Disaster Recovery Plan
by Chad Bahan - - August 13, 2003 in Disaster Recovery
This paper provides a discussion on business continuity and disaster recovery plans, which are critical components used to ensure that systems essential to the operation of the organization are available when needed.
System Administrator - Security Best Practices
by Harish Setty - - August 16, 2001 in Best Practices
This paper discusses some of the best practices, without getting into specifics of any particular operating system or version.
Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment
by Sunil Gupta - - August 8, 2012 in Intrusion Detection
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices.
Document Metadata, the Silent Killer...
by Larry Pesce - - December 3, 2008 in Digital Privacy
This paper will illustrate ways in which metadata stored in common types of documents can reveal secrets about an organization and how they can benefit an attacker.
Wireless LAN: Security Issues and Solutions
by Rafidah Hamid - - May 8, 2003 in Wireless Access
This paper gives brief information on the WLAN components and its architecture and examines the WLAN security threats (Denial of Service, Spoofing, and Eavesdropping); also discussed is how Wired Equivalent Privacy (WEP) works, (the IEEE 802.11b/WiFi standard encryption for wireless networking.)
Step by Step Installation of a Secure Linux Web, DNS and Mail Server
by John Holbrook - - April 8, 2004 in Linux Issues
This paper will show how the author configured a Linux based web and e-mail server for a small company. This server is co-located at a local ISP. Because of budget limitations, the company can only locate one physical box at the ISP which limits what security measures that can be installed.
Easy Steps to Cisco Extended Access List
by Nancy Navato - - July 5, 2001 in Network Devices
The purpose of this document is to explain in simple words how you can easily create an Extended Access List and apply it to your Cisco Router interface.
Using Windows Script Host and COM to Hack Windows
by Alex Ginos - - January 3, 2011 in Hackers
During the exploitation phase of penetration testing, the attacker may establish a beachhead on a target machine by running an exploit against a vulnerable network service. Often this results in a command prompt. At this point, the question becomes: How can the command line be used to advantage to access sensitive information, escalate privileges and find and attack other hosts? There are numerous useful hacking tools that can help with this but initially they are unlikely to be present on the compromised system. The attacker needs to bootstrap the process of further discovery and exploitation using only the limited tools and privileges available at the command prompt. In some cases, it may be necessary to evade detection by avoiding suspicious executables that may be flagged by anti-malware software running on the target. This paper explores the possibilities of using command line scripting tools and software components that are likely to be present on most Microsoft Windows systems to facilitate penetration testing.
Policy and the Windows Server 2003 Group Policy Management Console
by Norman Knight - - April 8, 2004 in Windows Issues
Group policy was first introduced with the release of Windows 2000 Server and Active Directory in the year 2000. With the introduction of Windows Server 2003, Microsoft has also released the Group Policy Management Console.
Information Security Policy - A Development Guide for Large and Small Companies
by Sorcha Diver - - March 2, 2004 in Security Policy Issues
Elements that need to be considered when developing and maintaining information security policy. This SANS whitepaper goes into the design for a suite of information security policy documents and the accompanying development process.
WiFi with BackTrack
by Antonio Merola - - December 24, 2007 in Auditing & Assessment
The idea behind this paper is to help auditors (especially whom not familiar with Linux) with wireless issues; it is a real hassle getting wireless works, either simply joining a network as legitimate client or conducting wireless audit, along with the plethora of tools available to wireless PenTesters. Before you eventually "go off", after days gone-by looking here and there, have a look to this guide, I do really hope you master Wi-Fi with BackTrack after this reading.
Using and Configuring Security Onion to detect and prevent Web Application Attacks
by Ashley Deuble - - July 12, 2012 in Intrusion Detection
Security Onion contains software used for installing, configuring, and testing Intrusion Detection Systems. Security Onion contains Snort, Suricata, Sguil, Xplico, nmap, scapy, hping, netcat, and tcpreplay (Burks, 2012).
Anti-Hacking: The Protection of Computers
by Chadd Schlotter - - April 2, 2001 in Attacking Attackers
The three aspects discussed in this paper: Education of the Security Adminis trator, Securing the Environment, and How to Fight Back are just one combined definition of how to protect a system against hacking.
An Introduction to Information System Risk Management
by Steve Elky - - June 6, 2006 in Auditing & Assessment
Key elements of information security risk, offering insight into risk assessment methodologies.
All papers are copyrighted. No re-posting or distribution of papers is permitted.