|
Donations |
|
|
|
|
|
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
|
|
|
Survey |
|
|
|
|
|
|
|
|
Translate |
|
|
|
|
|
|
|
|
|
|
Category: Main/Security How-To
Sort Links by: Title (A\D) Date (A\D) Rating (A\D) Popularity (A\D)
Sites currently sorted by: Title (A to Z)
Insecure.org
Description: security tools, security list, Nmap stelath port scanner, about microsoft, linux, solaris and more
Added on: 26-Jan-2003 Hits: 219
Rate this Site | Report Broken Link
IT Security Cookbook Now Available
Description: Over the past five years, Sean Boran has put together what has become the most comprehensive online Internet security resource available. LinuxSecurity recently had an opportunity to chat with the author, talk about its new home at LinuxSecurity.com, and a few words about the resource itself.
Added on: 27-Feb-2002 Hits: 198
Rate this Site | Report Broken Link
Octave@
Description: Information Security Risk Evaluation: What is OCTAVE®? Operationally Critical Threat, Asset, and Vulnerability EvaluationSM (OCTAVE), is an approach for self-directed information security risk evaluations that puts organizations in charge: Balances critical information assets, business needs, threats, and vulnerabilities. Measures the organization against known or accepted good security practices. Establishes an organization-wide protection strategy and information security risk mitigation plans. This approach, includes criteria that define the requirements for a comprehensive, self-directed information security risk evaluation, and for methods consistent with these criteria. The OCTAVE Method, available now, was built with large organizations in mind. A second method, OCTAVE-S, will focus on small organizations. These two methods will provide the end-points of a continuum of various methods aimed at different sizes and types of organizations. We expect many of these other methods to be developed by other organizations, using the criteria as basic requirements. OCTAVE helps you look beyond the technology infrastructure at the entire organization. OCTAVE has three phases to first determine what information assets really need to be protected. Only then is the technology infrastructure evaluated to determine if it can protect those assets and how vulnerable it is. Then, risks to critical assets are defined. Finally, good security practices are used to establish an organization-wide protection strategy and mitigation plans for specific risks to critical assets.
Added on: 08-Jul-2003 Hits: 96
Rate this Site | Report Broken Link
RobertGraham.com Infosec Publications
Description: An article on IDS (Intrusion Detection Systems), Traffic Sniffing in general, figuring out if traffic is hostile and how to sniff out intruder's traffic. A Lexicon for used terms and an explanation of what might be seen in firewall logs
Added on: 12-May-2002 Hits: 652
Rate this Site | Report Broken Link
Security Solutions (F-Secure)
Description: F-Secure Corporation is the leading provider of centrally managed security solutions for the mobile enterprise. The company's award-winning products include anti-virus, file encryption and network security solutions for all major platforms from desktops to servers and from laptops to handhelds. Customers in nearly every industry - Government, Manufacturing, Retail, Telecommunications, Finance, Energy, Transportation, High Tech and more - rely on F-Secure products to make information secure, reliable and accessible. Mobility challenges many of the fundamental assumptions upon which traditional IT systems have been based on. F-Secure supports businesses with a broad range of centrally managed and up to date security solutions to enable a truly mobile enterprise. For the administrator, F-Secure enables a dispersed user base with: Policy-based management Automatic enforcement Instant alerts Reports For the end-user, with F-Secure, security is: Invisible Automatic Reliable Always operating Up-to-date
Added on: 27-Jun-2003 Hits: 59
Rate this Site | Report Broken Link
Security Wizards
Description: The SecWiz Guide to Network Security is a web collection of documents helping to solve your network security problems in system-specific detail. This website is filled a wide variety of firewall-related information, including: technical articles, firewall rulesets, news, links to white papers, and listings of new tools and products. Security Wizards aims to be the largest central repository of security related information, with the objective of providing clarity on the burning issues regarding network security deployment and implementation. This site is aimed at security engineers and technical executives and will be updated on a fortnightly basis. (non- commercial site)
Added on: 10-Aug-2003 Hits: 67
Rate this Site | Report Broken Link
Select Page: [ << Previous Page ] 1 2 |
|
|
|
|
|
Login |
|
|
|
|
|
· New User? ·
Click here to create a registered account.
|
|
|
Forums Topics |
|
|
|
|
|
Syndication
|
|