TECH DIGITAL RESOURCE LIBRARY

Infosecwriters.com


Latest Content From Infosecwriters.com

Whitepaper: Statistical Analysis of Internet Security Threats

by Infosecwriters.comJan 01, 2008

There are many security threats that face computers in the world, and this paper is going to look at a few of them as they relate to the Internet. Since its inception, the Internet has grown from original purpose as a military tool to a worldwide phenomenon. According to the latest statistical analysis, it is estimated there are over 1.1 billion Internet users worldwide. The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. Threats discussed in this paper will include spam, phishing, computer viruses, hackers, and spyware/malware.


Whitepaper: Log Analysis for Intrusion Detection

by Infosecwriters.comJan 01, 2008

Log analysis is one of the most unnoticed aspects of intrusion detection. Currently every desktop is with an antivirus, companies with numerous firewalls and even simple end-users buying the latest security related tools. The author in this white paper briefs about the crucial security information that only few of these events have and nobody notices. A lot of attacks would not have happened (or would have been stopped much earlier) if administrators cared to monitor their logs.


Whitepaper: Wireless Attacks and Defense

by Infosecwriters.comJan 01, 2008

As more and more home and business users adapt wireless technologies because of their ease of use and affordability, these devices are coming under attack by the malicious who are after a person’s data and by the casual user looking for free bandwidth. This paper published by WEP explains how wireless attacks are done on Wired Equivalency Privacy (WEP) networks, other common network attacks and then present several options to defend wireless networks.


Whitepaper: Considerations for the Design and Implementation of a Storage Area Network (SAN)

by Infosecwriters.comJan 01, 2008

Today’s enterprises are using more complex, sophisticated, and resource-intensive software that generates massive amounts of data. The demand for businesses to maintain and manage large amounts of data has elevated storage issues to a level of significant priority. To meet the demands of industry, network storage technology has been an evolutionary process that has consolidated, streamlined, and simplified the storage requirements in an every-increasing distributed environment. A Storage Area Network (SAN) allow enterprises to provide data storage that is highly available, providing an ever-growing number of users access to accurate, reliable information without delay.