background preloader

Network Security & Information Security resource for IT administrators

Network Security & Information Security resource for IT administrators
Related:  IT security

ForensicsWiki How To Secure Your Wi-Fi Network Against Intrusion Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior. Read on as we show you how to secure your home Wi-Fi network. Why Secure Your Network? In a perfect world you could leave your Wi-Fi networks wide open to share with any passing Wi-Fi starved travelers who desperately needed to check their email or lightly use your network. In reality leaving your Wi-Fi network open create unnecessary vulnerability wherein non-malicious users can sponge up lots of our bandwidth inadvertently and malicious users can pirate using our IP as cover, probe your network and potentially get access to your personal files, or even worse. What does even worse look like? Securing Your Wi-Fi Network Securing your Wi-Fi network is a multi-step affair. Note: It would be impossible for us to include step-by-step instructions for every brand/model combination of routers out there. Don’t bother hiding your SSID.

Wi-Fi Best Practices | Mobile content from Windows IT Pro Like most technologies that an IT pro deals with, wireless technology changes from day to day. Not too long ago, having a wireless LAN (WLAN) was considered a mere luxury or something "nice to have." Nowadays, however, access to a WLAN is critical because the proliferation of mobile devices that have entered our industry invariably tout Wi-Fi as a key selling point. It's important to take stock of your current WLAN infrastructure if you have one, and to be aware of the latest standards if you're designing a new one—even if it consists of only a single Access Point (AP). The Band Played On Almost all discussions of Wi-Fi include at least a mention of spectrum bands—and our discussion is no different. Related: Wi-Fi: Tools to Detect Interference The IEEE standard that governs WLANs is called specification 802.11. 802.11b is perhaps the most well-known protocol, and for good reason. 802.11a also originated in 1999, as a speedier alternative to 802.11b. Channel Surfing Security, Not Obscurity

Les attaques de circuits intégrés Container-Based Controls versus Dynamic Authorization: The Difference in Windows Environments (Part 1 of 2) By Sandeep Chopra. If you are debating whether to upgrade to Windows Server 2012, plenty of articles describe its new security benefits (for example, see here and here). Fewer articles discuss the basic shift in Access Management this release can enable. To understand the potential benefits of one key feature, Dynamic Access Control, it’s useful to compare this approach with more well-known models of Access Management, such as ACLs and Security Groups. Container-Based Controls: ACLs and Group Management ACLs and Security Groups are currently the most ubiquitous model of Access Management. The ACL and Security Group model is both manual (with permissions defined per container, by an Administrator), and static (pre-determined and applied ahead of time). From the Perspective of IT Administrators From an IT Administrator perspective, managing permissions and containers can become difficult. For End Users For Compliance and Regulatory Staff There are several problems with this approach.

How to successfully implement the principle of least privilege How to Prevent Users from Changing Permissions on File Servers • Helge Klein On file servers in corporate environments one typically does not want users to change permissions, even on their own files. It might seem that it would be sufficient to simply grant change permissions instead of full control, but unfortunately that is not the case. The problem is that whenever a new file gets created, the user creating the file will be its owner. And owners can always change permissions, regardless of the contents of the DACL. The Solution In order to prevent “orderly” users from “tidying” the permissions on their files and directories and thus messing things up, often removing administrators from the DACL, too, the following needs to be done: Only grant change (aka modify) permissions in the NTFS file system. The clever part is not granting “full control” in the share permissions to users. Authenticated users: change + readAdministrators: full control Automation

Introduction to Windows Server 2012 Dynamic Access Control | Windows Server Blog We constantly strive to reduce the steps required for you to get your job done. One of the reasons Windows Server 2012 is a such great release is that we spent so much time listening to our customers and understanding their scenarios and concerns. When development teams start from a technology/feature mindset, it can be hard to work across groups because helping another team usually means that you have to give up something you wanted to do. Anyone that has been involved in securing data or accessing data security knows that the traditional security models and mechanisms are not always flexible enough to address today’s concerns and scenarios. If you haven’t downloaded the beta yet, take some time to read this blog and watch some of the videos it points to and then schedule some time on your calendar to download the beta and try it out. Nir Ben-Zvi, a Program Manager on the File Server team, wrote this blog. –Cheers Jeffrey You can find a Dynamic Access Control overview demo here.

Meltdown et Spectre : tout savoir sur les failles historiques des processeurs Nous évoquions hier une faille de sécurité dénichée dans tous les processeurs Intel sortis depuis une dizaine d’années. Il s'agissait déjà d'une faille énorme, mais ce n’était en réalité qu’une petite partie du problème. Puisque l’information est sortie dans la nature plus tôt que prévue, les acteurs impliqués ont fini par communiquer, ce qui nous permet de connaître plus précisément l’étendue des dégâts. Il n’y a pas une faille, mais deux assez similaires. Faut-il paniquer pour autant ? Pour faire le point sur ce que l’on sait à l’heure où nous écrivons ces lignes, voici une série de questions et de réponses. Sommaire Quelles sont les différences entre Meltdown et Spectre ? C’est la révélation majeure de ces dernières heures : il n’y a pas une faille de sécurité liée aux processeurs, mais deux. Sans trop entrer dans les détails techniques, car ils deviennent vite très (très) compliqués, les deux failles sont à la fois similaires et assez différentes. Suis-je concerné par ces failles ?

Objective-See Love these free tools? Support them via my patreon page! 🙏 In today's connected world, it is rare to find an application or piece of malware that doesn't talk to a remote server. learn more Physical access (or "evil maid") attacks are extremely insidious yet highly efficient. learn more "KnockKnock... learn more TaskExplorer allows one to visually explore all running tasks (processes). learn more Malware and other applications may install persistent keyboard "event taps" to intercept your keystrokes. learn more Netiquette, a network monitor, allows one to explore all network sockets and connections, either via an interactive UI, or from the commandline. learn more BlockBlock provides continual protection by monitoring persistence locations. learn more By continually monitoring the file-system for the creation of encrypted files by suspicious processes, RansomWhere? learn more Mac malware often spies on users by recording audio and video sessions...sometimes in an undetected manner. learn more

Related: