Defend: The entity defends its networks by using appropriate prevention controls, technologies and techniques designed to render improbable or impossible an attack by a network assailant. The entity uses a layered defense-in-depth approach to assure that risks to its systems are defended, and that the basic tenets of information security are designed into the network’s […]
The hacktivist group Anonymous, or someone claiming to be associated with them named Dylan K., has taken the unusual step of petitioning the Obama Administration to make Distributed Denial of Service Attacks DDoS legal. via “Anonymous” petitions Obama to decriminalize DDos attacks: Voice of Russia.
While it would take thousands of smartphones to equal the attack volume of compromised servers used in the latest bank attacks, such large-scale DDoS are not in the majority… With mobile devices, the attack could theoretically come from thousands of compromised devices in the same region or country as a bank’s customers, making it difficult […]
Caught a little of All Things Considered on NPR last night while I was driving and almost had to pull over immediately when I heard Tom Gjelten and Mellissa Block‘s piece titled “Iranian Government May Be Behind Recent Cyber Attacks“. It’s very hard to defend against this type of attacks. There are some cyber-security firms […]
honeynet.org David Dittrich really lambasts a CSO article. He references EXCELLENT source material, including a chapter from 2005, chapter 182 in Vol III, Handbook of Information Security
http://www.packetknife.com/briefly-on-the-network-use-of-force-continuum Well written commentary. Looking forward to more debate.
The issue with indictments is that they require attribution. How does the DoJ plan to reconcile this notion as their very own fires a soundbite like this one: “I’ll give you a prediction,” said John Carlin, the principal deputy assistant Attorney General in Justice’s national security division. “Now that we are having people look at […]
“Brown Printing Co., which prints popular magazines and catalogues, knew that it had valuable assets in its computer systems and that those assets — online editions and subscriber databases — were increasingly at risk with the proliferation of cyber-espionage.And so, to confront one of the newest and most damaging crimes, it turned to one of […]
Apple is designing Skeuomorphic applications to help people more intuitively grasp their operating environment. “Skeuomorphism, as it applies to computer software, is the use of ornamental design elements that represent familiar objects in the digital realm. The technique was first implemented by software designers to help ease users into the unfamiliar world of computing. For […]
Great article from the COPS Office at the US Department of Justice on the use of force. http://www.cops.usdoj.gov/default.asp?item=1374 Some good quotes from the article: The International Association of Chiefs of Police (IACP) in its study, Police Use of Force in America 2001, defined use of force as “The amount of effort required by police to […]