Intrusion Detection RFCs
There are now three RFCs regarding Intrusion Detection :
There are now three RFCs regarding Intrusion Detection :
Posted by
Tedi Heriyanto
at
09:43
0
comments
Labels:
links
One important outcome of the legislation is improved information about the types of security breaches. Many of the news stories between 1984 and 2004 report palty details, with sources being off the record and vague estimates of the severity of the security breach. Since mandatory reporting legislation in many states, most news coverage provides more substantive details. In 2006, only 10 of the 257 news stories were unable to make some attribution of responsibility for a security breach. (Emphasis added.)
Posted by
Tedi Heriyanto
at
10:04
0
comments
Labels:
links
Posted by
Tedi Heriyanto
at
09:02
0
comments
Labels:
links,
security
Posted by
Tedi Heriyanto
at
15:16
0
comments
Labels:
links
From DarkReading :
Enterprises are leaking an increasing amount of data from the inside, and they aren't sure what to do about it.
Those are the conclusions of two new studies -- one from the Ponemon Institute and one from Enterprise Strategy Group -- being published today. Both of the reports suggest that enterprises should be shifting their security attention from the outside to the inside.
The new Enterprise Strategy Group report found that one third of the enterprises surveyed had experienced a loss of sensitive data in the last 12 months, while another 11 percent were unsure whether a breach occurred. According to the new Ponemon study, nearly 60 percent of U.S.-based businesses and government agencies believe they are unable to effectively assess or quantify insider threat risks within their organizations, leaving them open to privacy breaches, failed audits, and potential fraud or misuse of data.
Posted by
Tedi Heriyanto
at
09:11
0
comments
Labels:
links
I read a blog posting by Ed Finkler "Do Open Source Devs Get Web App Security? Does Anybody?".
In it he described disturbing statements contained in one of Open Source Content Management System :
A colleague of mine who is dealing with Plone, a CMS system built atop Zope, pointed me to a rather disturbing documents in the Plone Documentation system, one that I feel is indicative of a much larger problem in the web app dev community.
The first describes a hole (subsequently patched) in Plone that allowed users to upload arbitrary Javascript. Apparently no input or output filtering was being done. Certainly anyone familiar with XSS attacks can see the potential for stealing cookie data, but the article seems to think this is simply a spam issue.
In closing, Ed Finkler gives blunt statements :
A web developer is not qualified to do the job if he or she does not have a good understanding of web application security concepts and techniques. Leaders of development teams must stop allowing developers who are weak on security techniques to contribute to their products, and managers need to stop hiring candidates who do not demonstrate a solid secure programming background. If they continue to do so, they demonstrate a lack of concern for the safety of their customers.
Posted by
Tedi Heriyanto
at
11:03
0
comments
Labels:
links
NIST have released a new publication (SP800-94) that covers just about everything you can think of when it comes to IDS and IPS. The report is titled "Guide to Intrusion Detection and Prevention Systems (IDPS)".
Posted by
Tedi Heriyanto
at
16:16
0
comments
Labels:
links,
security guides
Dheera Venkatraman has published an article describing how to attack blurring image to conceal information.
In the article, he describes :
Undoubtedly you have all seen photographs of people on TV and online who have been blurred to hide faces.
For the most part this is all fine with peoples' faces as there isn't a convenient way to reverse the blur back into a photo so detailed that you can recognise the photo. So that's good if that is what you intended. However, many people also resort to blurring sensitive numbers and text. I'll illustrate why that is a BAD idea.
And he gives suggestion to conceal information in images, we should just color over them.
Posted by
Tedi Heriyanto
at
12:12
0
comments
Labels:
articles,
links
The National Institute of Standards and Technology (NIST) has released two new information security documents.
Posted by
Tedi Heriyanto
at
10:06
0
comments
Labels:
links
I got the following picture from Jeremiah Grossman's blog.
I highligthed the SQL code for your easy reading. :D
Posted by
Tedi Heriyanto
at
14:21
0
comments
Labels:
links
Joanna Rutkowska posted a blog about "Beyond The CPU: Cheating Hardware Based RAM Forensics".
Here is the main point of the blog :
The whole idea behind hardware based RAM acquisition is that the process of reading the memory is using Direct Memory Access (DMA) to read the physical memory. DMA, as the name suggests, does not involve CPU in the process of accessing memory. So, it seems to be a very reliable way for reading the physical memory…I look forward to read her presentation about this after her BlackHat DC conference.
But it is not! At least in some cases...
Posted by
Tedi Heriyanto
at
10:17
0
comments
Labels:
links