Skip to main content

Home/ IT Industry Articles & Resources/ Group items tagged Security

Rss Feed Group items tagged

Phil Ashman

Cisco Blog » Blog Archive » Securing IPv6 - 0 views

  •  
    In the previous installment of our series of IPv6 security posts, we covered some of the ways addressing has changed in IPv6 compared to IPv4. In this post, we'll talk about some of the things to consider when securing IPv6 compared to IPv4. Before digging into this topic, however, it is important to remember that while IPv6 may have different security concerns than IPv4, it is not necessarily any more secure than IPv4. Furthermore, the post will focus on those aspects that are different or unique to IPv6, since many of the common best practices for IPv4 networks also apply to IPv6 networks.
Phil Ashman

CCIE L2 security, a FRAME of reference… - CCIE Blog - 0 views

  •  
    Some screen captures so L2 security (DHCP snooping, ARP inspection etc..)
Phil Ashman

Flexible-Packet-Matching.pdf - 0 views

  •  
    One of the issues facing network and security engineers is defending the network against dynamic threats. This means traffic that cannot easily be identified by regular means, such as an application that changes layer 4 ports or tunnels within an existing protocol. Because of this, a solution is needed to match and filter based on specific information within the packet that is unique to the application you want to block.
Phil Ashman

CCNA Security: SSL VPNs - The Cisco Learning Network - 0 views

  •  
    Cisco Learning network videos on SSL VPNS
Phil Ashman

IOS Console Customization - Packet Life - 0 views

  •  
    Packet Life is a blog and community site for network engineers. Cheat sheets, free lab access, wiki, forums, packet captures, security tools.
Phil Ashman

Guide to Installing and Booting Windows 8 Developer Preview off a VHD (Virtual Hard Dis... - 0 views

  •  
    Another resource for network security help.
Phil Ashman

Cisco IOS Intrusion Prevention System (IPS) Tier 1 Part 1 - CCIE Blog - 0 views

  • In order to master these terms, just remember these things: any term that includes False is a BAD THING, while True is a GOOD THING; and Positive refers to an event/signature being triggered, while Negative refers to an event/signature not being triggered. With these facts in mind, notice how easy it is to master these terms: False Positive – an event was triggered and the packet was not actually attack traffic False Negative – an event was not triggered and the packet was actual attack traffic True Positive – an event was triggered and the traffic was actual attack traffic True Negative – an event was not triggered and the traffic was not actual attack traffic
  • In order to master these terms, just remember these things: any term that includes False is a BAD THING, while True is a GOOD THING; and Positive refers to an event/signature being triggered, while Negative refers to an event/signature not being triggered. With these facts in mind, notice how easy it is to master these terms: False Positive – an event was triggered and the packet was not actually attack traffic False Negative – an event was not triggered and the packet was actual attack traffic True Positive – an event was triggered and the traffic was actual attack traffic True Negative – an event was not triggered and the traffic was not actual attack traffic
  • False is a BAD THING, while True is a GOOD THING; and Positive refers to an event/signature being triggered, while Negative refers to an event/signature not being triggered. With these
Phil Ashman

Open Source Digital Forensics - 0 views

  •  
    The Open Source Digital Forensics site is a reference for the use of open source software in digital investigations (a.k.a. digital forensics, computer forensics, incident response). Open source tools may have a legal benefit over closed source tools because they have a documented procedure and allow the investigator to verify that a tool does what it claims.
1 - 20 of 25 Next ›
Showing 20 items per page