The challenges of Security in a map

This is one of the many mindmaps from Aman Hardikar: You can see that it is not only network firewalls and websites that need to be reviewed.   A security architecture needs to be developed from security principles within procedures and goals laid out within business objectives.  

How would you know if your website was targeted by hackers?

The _only_ way is to test your site… review your potential services and programs running on the website Use the alpha service evaluation sample Or try the Sigma (∑) service evaluation sample   either way you will have a better picture of your hacker liability today. Contact Us

Sample report

we have placed a sample evaluation on our fixvirus.com site (the alpha-A scan) Here we have scanned a server and found it had a few services turned on that should not have been. (Telnet and ftp should be replaced with a secure version, such as ssh and scp) The web services need to be tested … Read more

Keep an eye on CERT – New website look

CERT – Community  Emergency Response Center  for computers was created in 1988 in response to the Morris worm. The CERT organization I am talking about is based out of Carnegie Mellon(Software Engineering Institute), and has helped the computer industry with their insight and tools The CERT tools link.  There are some good tools to use … Read more

The security dilemma

Information Security has a dilemma: the problem is that we don’t want to be seen(interfere) with whatever the user wants to do, but yet there need to be secure transactions. The security of our network and applications need to be part of Information technology actions. The website, email and network traffic needs to get where … Read more