fbpx
 

Category: Database security

The Amazon cloud outage and the future of Cloud Computing

Amazon’s cloud service, which provides services to several well-known companies, such as Quora and FourSquare, suffered an outage for more than 24 hours between April 21-22, at its Northern Virginia Data Center. Amazon spreads out its data cloud infrastructure throughout the country, but the clients who were being supported from this center have experienced downtime – meaning their users couldn’t log into the company’s websites. This brings up the question as to whether one of the strongest selling points of […]

State of the Security Work Force 2011

Frost & Sullivan and the security professional group (ISC)2 recently conducted a survey on the state of security work force. The survey’s leader says that information security professionals are too busy with their day-to-day work to devote enough time for security related work. This inability to focus on security work leaves IT security professionals unprepared for major technological changes such as cloud computing and the increasingly sophisticated spectrum of application security threats. The survey’s report states that companies are potentially […]

SANS 20 Critical IT Security Controls: #12: Malware Defenses

One of the most vulnerable security areas is malicious software that hackers piggyback on to steal your data. Companies may suddenly find their E-Mail systems hacked because an employee unwittingly opened a malicious email attachment. Hackers target companies through malicious software that gains entry to your system though email attachments, web browser and mobile devices. To counteract malware, you must use antivirus and anti spyware software. Tools such as this can detect malware and block their execution. If you want […]

OWAP Top Ten – #3. Broken Authentication and Session Management

One of the most vulnerable areas of web applications is the authentication and session management. Weak authentication and session management enlaces hackers to steal passwords, session tokens, encryption keys and even assume the identity of legitimate users. Session IDs are frequently exposed without the SSL or TSL protection or revealed through the rewriting of URLs. The attackers could be external hackers or insiders who want to use other user’s accounts to perform malicious acts. The problem is caused mainly because […]

SANS 20 Critical IT Controls – #10: Continuous Vulnerability Assessment

Attackers are constantly are on the prowl for new vulnerabilities to exploit. You can expect hackers to launch numerous attacks right after vulnerabilities are discovered and announced. That is why it is important to apply vulnerability patches almost immediately after the vendor makes the patch available to you.

SANS 20 Critical Controls #9: Controlled Access Based on Need to Know

The first step you must take is to identify your sensitive data, by establishing a data identification scheme. A multi level data sensitivity classification based on the sensitive level of the data is especially useful.

SANS 20 Critical IT Controls #8: Controlled Use of Administrative Privileges

A common technique used b y hackers is to guess the passwords for administrative users to gain access to a server, and from there compromise vast swatches of a system. Hackers are constantly devising powerful password cracking tools to see if they could grab a system admin or network admin’s password.

In Archive