Security

All Security Articles

Showing 1-20 of 105

Sort by Date | Title | Popularity

Page: « Prev 1 2 3 4 5 Next »

1.
2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
By Brad Bowers
May 2, 2011
Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
2.
A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
By Seth Fogie
Mar 31, 2006
Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
3.
Analyzing MPLS VPN Security
By Michael H. Behringer, Monique Morrow
Oct 6, 2005
VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
4.
Attacking and Defending the Internet with Border Gateway Protocol (BGP)
By Carolyn Meinel
Aug 25, 2008
Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
5.
Attacking the Spanning Tree Protocol
By Eric Vyncke, Christopher Paggen
Jun 4, 2008
Conducting STP attacks is now within the reach of a wide population, thanks to the availability of point-and-shoot attacks tools. Fortunately, simple features widely available on a range of switches, such as BPDU-guard, provide effective measures against spanning-tree–based exploits.
6.
Basic Cisco IOS Software and Catalyst 3550 Series Security
By Dmitry Bokotey, Andrew Mason, Raymond Morrow
Jul 25, 2003
Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
7.
Broadband Routers and Firewalls
By Ido Dubrawsky, Wes Noonan
Nov 17, 2006
8.
Building a Human Firewall: Raising Awareness to Protect Against Social Engineering
By Thierry Wohnlich
Oct 27, 2006
Thierry Wohnlich proposes an alternate view of information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discusses the role of the individuals in relation to information technology.
9.
Building Cisco IDS 3.0(3) Custom Signatures
By Earl Carter
Feb 15, 2002
Tuning your IDS to meet your specific network requirements is crucial for optimum protection of your network, as discussed in this article by Earl Carter.
10.
Capturing Network Traffic for the Catalyst 6000 IDS Module
By Earl Carter
Feb 15, 2002
With the addition of the Catalyst 6000 IDS Module, you can integrate your Cisco IDS directly into your network’s infrastructure, as discussed by expert Earl Carter.
11.
CCDC and the Tale of the Insider Threat
By Brad Bowers
May 24, 2010
Brad Bowers discusses the value of including the threat of insider attacks in Collegiate Cyber Defense Competition (CCDC) events.
12.
CCSP Cisco Secure PIX Firewall Advanced Exam: CiscoWorks Management Center for Firewalls
By Greg Bastien, Earl Carter, Christian Degu
Jan 7, 2005
To help you prepare for the CCSP Cisco Secure PIX Firewall Advanced Exam, this chapter provides information on using CiscoWorks with Firewall MC.
13.
CCSP Cisco Secure VPN Exam: Remote Access Configuration
By John Roland, Mark Newcomb
May 23, 2003
14.
CCSP CSI Exam Certification: SAFE IP Telephony Design
By Ido Dubrawsky, Paul Grey
Dec 30, 2004
This chapter will help you prepare for the CCSP CSI Exam, with a focus on SAFE IP Telephony Design. Sample questions are included to help you study.
15.
CCSP Self-Study: Advanced AAA Security for Cisco Router Networks
By John Roland
May 21, 2004
For CCSP candidates, John Roland discusses Cisco Secure ACS 3.0 for Windows 2000/NT Servers, Cisco Secure ACS for UNIX, and the security services of TACACS+, RADIUS, and Kerberos.
16.
Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
By Brandon J. Carroll, Premdeep Banga, Vivek Santuka
Feb 2, 2011
ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
17.
Cisco ASA Authentication, Authorization, and Accounting Network Security Services
By Jazib Frahim, Omar Santos
Jan 28, 2010
This chapter provides an explanation of the configuration and troubleshooting of Cisco ASA-supported authentication, authorization, and accounting network security services.
18.
Cisco ASA Security Contexts
By Omar Santos, Jazib Frahim
Dec 16, 2005
The virtual firewall methodology enables a physical firewall to be partitioned into multiple standalone firewalls. Each standalone firewall acts and behaves as an independent entity with its own configuration, interfaces, security policies, routing table, and administrators. In Cisco ASA, these virtual firewalls are known as security contexts. This chapter covers security contexts in detail.
19.
Cisco Asks, Can Security Skills Be Certified?
By Yusuf Bhaiji
Jul 23, 2004
Yusuf Hussain Bhaiji explores the value of certification in IT Security given its rapidly changing nature and offers suggestions on choosing the right certification program.
20.
Cisco IDS Sensor Deployment Considerations
By Earl Carter
Feb 15, 2002
Correctly deploying your Cisco IDS Sensor is crucial to protecting your network. Earl Carter helps you understand your network topology, as well as the critical components on your network.

Page: « Prev 1 2 3 4 5 Next »