Network security

Security and Datacenters

A Datacenter is a collection of several different elements, all working together to offer a platform to our digital needs. A datacenter is actually a mix of different elements, some logic some physical, it is just not a mere collection of elements but a complex systems with a lot of interactions. We can easily see inside the datacenter, cables, racks, servers, network equipments, storage units and so on but all are there (or should be there) for a purpose and are interconnected. A big part of a datacenter is not even visible; it is the software and data running in…

Security and Risks Updated

When I’m talking about security with customers, partners or at an event the first question I usually receive is: how much this will cost to me? This is an understandable question, costs have to be monitored and expenditures have to be planned wisely;  how much I can spend on security is a quite interesting topic. The problem, alas, is that usually IT managers do not use a clear model when planning investment in security but seemed to be attracted more by strange inner believes than an empirical analysis of cost and benefits. Another point that I’ve always found quite curious is that…

Introduction To Network Security – Part 2

Introduction To Network Security – Part 2: By Sahir Hidayatullah – Firewall.cx Security Advisor Tools An Attacker Uses Now that we’ve concluded a brief introduction to the types of threats faced by both home users and the enterprise, it is time to have a look at some of the tools that attackers use. Keep in mind that a lot of these tools have legitimate purposes and are very useful to administrators as well. For example I can use a network sniffer to diagnose a low level network problem or I can use it to collect your password. It just depends…

Se il DDoS è un atto politico

Se il DDoS è un atto politico: … gli intervistati coinvolti nella ricerca dell’azienda che si occupa di sicurezza informatica, sempre più spesso dietro un DDoS o un tentativo più o meno riuscito di crack dei sistemi altrui c’è la politica, l’ideologia, la rivendicazione sociale. Related posts: Digging it up on Security Costs and Security Budgets – part1 How to Become an Ethical Hacker Hakin9 StarterKit 2/2011 – DDOS Attacks | Magazine | IT Security … My Latest Article on Hakin9 is on Ddos Security and Risks Updated Powered by YARPP.

Posts navigation