Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged vulnerability

Rss Feed Group items tagged

Search and More

Network security( Penetration testing) : cyber-crime is costing the UK's small businesses - 0 views

  •  
    It's a well-known fact that small businesses are more susceptible to cyber-crime than many of their larger counterparts. A lack of funding and resources means that few small to medium-sized businesses can afford to pay for vulnerability assessments or penetration testing of their network security.
Tom Berzins

There's more to security risk management than just patching - 0 views

  •  
    With an increasing number of critical systems being placed within virtual environments, security is now understandably a prime concern. Systems can be attacked, and valuable information and assets can be compromised. maybe looking at a Vulnerability management system?
Bujuanes Livermore

An illustrated guide to DNS vulnerability - 1 views

  •  
    The year was 2008. The person was Dan Kaminsky. The discovery: DNS has security flaws. Translation: the website you are visiting may not actually be the genuine site. This might take you 15 minutes to read through, and perhaps longer to absorb....but I highly recommend spending time on learning about the technicalities of DNS and the vulnerabilities of its functionality. The discovery of its weak points is what DNS security is addressing. Briefly, it covers the distributed nature of DNS, how cache poisoning occurs and patch recommendations to provide a 'fix'.
Allison Jones

http://www.guardian.co.uk/world/2010/may/23/us-appoints-cyber-warfare-general - 1 views

  •  
    Increasing "probes" on US military networks has led to the appointment of a senior general to Cyber Command operations and approximately 30,000 troops have been re-assigned from IT support to "the frontlines of cyberwarfare". The US is increasingly anxious about the vulnerability of its networks to attack. Chinese, Russian and Korean hackers have been targeted as alleged attackers so far. There is concern that cyberwarfare techniques being used by the US are outpacing the ability to develop policy surrounding their use.
1 - 4 of 4
Showing 20 items per page