Posts Tagged Security

Excellent IT Security Education Resource!!!

For folks that are interested in learning about IT Security. Especially the ones going for Security+, CISSP, etc. Certifications will find the following resource to be an awesome reference. Here is the link: CCURE.ORG

No Comments

RSA Conference 2009 – Keynote Webcast

While I was researching Security stuff online, I came across RSA Conference 2009 Video Webcasts. Its really awesome stuff. Basically this a conference where all the Security Top Dogs from well-known companies like Cisco, Microsoft, Symantec, etc. come together to discuss the role of Security in ever-increasing complex IT Eco-System. Click on the link below to view the webcasts: RSA Conference 2009 – Keynote Webcast

,

No Comments

Cisco Security Advisories and Notices

The following link provides a report on vulnerabilities found in Cisco products/softwares & mitigation techniques: cisco.com/go/psirt

,

No Comments

Biometric System – Type I & II Errors

Biometric System is referred to as a phenomenon whereby human traits such as finger prints, palm scan, voice patterns, retinal/iris scan, etc. are utilized & analyzed for identification purposes. Biometric System (aka Biometrics) provides a solid identification platform since it compares identification/authentication against physical human traits stored in a Computer System (Database). Just like any other technology; Biometrics has its drawbacks as well. Two of the most common drawbacks I would like to point out here are the following:

  • Type I Errors: These types of errors occur when a person with valid identification/authentication credentials gets rejected. This error occurs when the Biometric System is calibrated to be highly accurate. Type I Errors are most common in Top Secret facilities/organizations since they can’t afford Type II Errors. Now this begs a question: What are Type II Errors? I am glad you asked. Read below 🙂
  • Type II Errors: These types of errors occur when a person with NO credentials get access. This is a very serious issue. That is why its very important that the Biometric System be calibrated with quite precision keeping a delicate balance in mind.

,

No Comments

The Internet Is Infected

,

No Comments

CISSP CBK Domains

CISSP (Computer Information Systems Security Professional) Exam is based on the following 10 CBK (Common Body of Knowledge) Domains defined by (ISC)2 or International Information Systems Security Certification Consortium:

cissp-cbk-domains

,

No Comments

Computer Crime & Intellectual Property Section

United States Department of Justice provides computer crime related information for public awareness on their Computer Crime and Intellectual Property Section here:
www.cybercrime.gov

No Comments

Most Common TCP/UDP – Transport Layer Ports!!!

ultimate-port-list

, ,

No Comments