Cybersecmag

Cyber Crime Attacks and Defence

Version
Download18
Size9.84 MB
Create DateSeptember 19, 2014
Last UpdatedJanuary 7, 2016

Dear Readers,

We are glad to welcome you in 2014 with our latest OPEN issue. This year we are going to develop the magazine so that it met your high expectations as for the content and the services we provide. The first step to reach this destination is the very publication you are going to download.

We would like to present OPEN magazine – the publication that is, and will always be, free for all the readers registered on our website. We are going to put effort into ensuring one OPEN issue is published every month with the professional content that our readers are interested in.

OPEN supplies you with the genuine articles only, these have never been and will not be published in any other CYB3R’s publication – the only chance to read them is to download the issue from our website.

INSIDE:

Defending Industrial Control Systems with Data Diodes
By Austin Scott, CEO of Synergist SCADA Inc

Originally designed by government organizations to protect top secret information, data diodes are most commonly used in applications requiring the highest level of security such as state secret protection, banking or battlefield up-links.
In recent years I have seen an increasing demand for data diodes in the world of industrial control and automation to protect critical infrastructure due to the simple and virtually impenetrable nature of these devices. In this article we will explore the inner workings and practical control system applications of these unidirectional gate-ways and provide a step by step guide to creating your own using open source software.

New Threats, Vulnerabilities and Rapidly Evolving Service Delivery Models Pose Challenge to Traditional Enterprise Information Security Strategies
By Lane Cooper, Editorial Director at BizTechReports and Content Strategist for G2Market

Maintaining a solid information security profile across the enterprise has always been a tough assignment. But the assignment is only getting tougher and more complex, according to the latest insights from leading voices in the analyst community. Recent research shows a risk and threat landscape that is changing dramatically with strong adoption of cloud services, mobility, virtualization as well as new business executive interest in both enterprise technology and security issues.

How Does Cyber Crime Pay
By Doug Steelman, Chief Information Security Officer at Dell Secureworks

The world of cyber crime is awash in numbers. Pundits, professors and politicians alike often comment on the costs imposed by the ever growing underground of cyber criminals, citing estimates from the millions to the billions. This number reached new heights in May, 2009 when President Obama (quoting an industry figure) proclaimed that at least a trillion dollars was being sucked from economies worldwide from cyber attacks.

Notorious NetFlow: Leveraging NetFlow to Find Bad Actors on Your Network
By Mike Schiffman, Packet Accountant at Cisco Systems, Qualys, PokerTrip Enterprises Inc

NetFlow is a powerful tool for profiling network activity and learning which device is talking to which. The Internet Bad Actors are malicious parties that are sourced from IP addresses of ill repute. Wouldn’t you want to know if a node in your network was reaching out to a botnet command and control server? In this article, you’ll learn how Cisco leverages NetFlow with IP reputation to do just that.

Evolving Threat Landscape of Cyber Attacks : APT with Hacktivism
By Vikalp Shrivastava, Head Security Solutions – APAC for Radware

We are living in a society closely connected with the Internet, which is also called a cyber-world. The Internet revolution is the biggest revolution in human history, but it has its own good and bad sides. It gives people an extraordinary way of communication to share their thoughts, which can be positive or negative, if it’s negative then it also gets popularity and audience rapidly because of the enormous size cyberspace.

How your favorite search engines could prove to be very costly if you’re not careful
By Neha Malik, Software Developer, Program Manager, Security Analyst

It is no shocker that in this Information Age, a majority of applications are hosted online for users’ functions that impact different aspects of businesses and daily proceedings. There are few areas of our lives that the Internet, and subsequently, search engines have not touched. Not a day goes by wherein we don’t turn to preferred search engines for solving professional or personal dilemmas.
The following pages are my descriptive attempts to illustrate how search engines, in this case Google, can cough up attackers’ gold when used with their enhanced capabilities.

Humans – The Weakest Link for Spear Phishing
By Nilay Sangani, IT Security Planning Analyst, C|EH, E|CSA, MCTS and MCPD

Most attacks in the cyber world are aimed at humans to gain the pivotal information such as credit card details, bank account numbers etc. Organizations are often targeted to have phishing emails being thrown at a specific set of employees. Once again humans are the weakest link.

The Hagelin M-209 Cipher Machine
By John-André Bjørkhaug, Lead Network & Security Engineer at Ikomm

During WW2 cipher machines were extensively used, both by the allied and axis nations. Most famous is the German Enigma machine. The allied used multiple machines, but the Swedish M-209 stood out. The fully mechanical, and impressive complex machinery, was produced in the amazingly amount of 140000 during WW2, and used by multiple allied nations. This paper will first give a short introduction to cryptographic rotor machines, describe the history of Boris Hagelins cipher machines, then discuss details of the M-209s, its mechanical properties, how its ciphering works, how to use it, and cryptanalysis work done on it.

Walk Through the Data Types
By Steve Banta, IT Security Operations Lead at Tata Consultancy Services

I’ve been married for 17 years now and to this day if I ever have to go to the feminine hygiene section to pick something up for the womenfolk in my household it always takes an uncomfortably long time to locate what I’m looking for. I stare dumbly at the shelves in front of me oftentimes on my cell asking for the specifics. Even then, I feel like it’s a gamble when I finally grab the target item and quickly dart away from that section of the store. Why is this!? I’ve ran this errand plenty of times by now. I’ve overcome much of the needless fear of being looked at funny by other shoppers who see me in this scenario. I should be a pro by now! And furthermore, I go shopping with my wife and within 3.5 seconds she has grabbed what she needs and is moving right along to Dairy where I finally feel useful because she needs me to load up some heavy milk cartons. What’s going on here?

ICT Leaders Emerging Throughout Central & Eastern Europe
By Roger Strukhoff, Executive Director, Tau Institute

Poland’s economic performance over the past 20 years has been strong, and its outlook remains optimistic. Our research shows that this is no accident, as Poland is a very strong performer when it comes to developing a national ICT infrastructure.
Poland easily finishes among the Global Top 20 in our overall rankings, and is one of the most optimal “Goldilocks” nations — developing neither too rapidly nor too slowly — in terms of its future potential.
Yet Poland is not alone as a star performer in its region: Bulgaria, Hungary, Slovenia, Romania, and the Czech Republic finish in our Top 30. Ukraine also joins the party as a world leader when we measure potential.


File
CYB3R_OPEN_01_2014.pdf

Please login or Register to access downloadables
September 19, 2014

0 responses on "Cyber Crime Attacks and Defence"

Leave a Message

Your email address will not be published. Required fields are marked *

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013