Tuesday , September 25 2018
Home / IT Security (page 4)

IT Security

Penetration Testing Frameworks & Alternative Methods

Penetration Testing Frameworks & Alternative Methods

Overview of Alternative Methods: Now that you have an idea of what penetration testing is, we need to take a close look at the process that a penetration tester follows outside of what EC-Council offers. When you are considering a methodology to follow, you must remember some points and ideas …

Read More »

Understanding Denial of Service

Understanding Denial of Service

Understanding DoS: Denial of Service is an attack that aims at preventing normal communication with a resource by disabling the resource itself or by disabling an infrastructure device providing connectivity to it. The disabled resource could be in the form of customer data, website resource, or a specific service, or …

Read More »

Commonly Employed Threats

Commonly Employed Threats

Commonly Employed Threats: Many threats will continue to pose problems for those using the Internet, and unless you opt to stop using this resource, you must address the threats. This section explores threats targeted toward human beings and the weaknesses of human nature. What type of threats target users and …

Read More »

Social Networking To Gather Information?

Social Networking To Gather Information?

Social Networking to Gather Information: Over the last decade, some of the biggest security threats have come from the use of social networking. The rapid growth of these technologies lets millions of users each day post on Facebook, Twitter, and many other networks. What Type of Information Are They Posting? …

Read More »

Social Engineering : Identity Theft

Identity Theft

Identity Theft: One of the most prominent and rapidly evolving threats is identity theft, which falls under the heading of social engineering. According to the Federal Trade Commission, in the United States, identity theft is one of the most rapidly growing crimes over the last few years; thus, the public …

Read More »

Mobile Device Security Models

The Mobile Device Security Models Android & iOS

Device Security Models: So how have designers built their systems with an eye toward addressing security problems? Several steps have been taken, but overall there has been an attempt to approach the problem of security through five key areas, each addressing a specific problem or need: Access control is used …

Read More »

Goals of Mobile Security

Goals of Mobile Security

Mobile Security: Mobile operating system comes in four flavors: Blackberry, Windows Mobile, Google Android, and Apple iOS. Of these, the Apple iOS and Google Android operating systems are by far the ones most commonly found on modern devices. In order to simplify the examination of mobile operating system and devices …

Read More »

The US Police Phone Tracking Company Hacked

The US Police Phone Tracking Company Hacked

US Police Phone Tracking: The Securus is a basically a phone tracking company that helps the police to track any phone which is within the U.S. Recently, The company was under a major attack when a hacker successfully hacked into the their system. According to Motherboard the hacker may have …

Read More »