Prevention and Protection Strategies Archives - Ian Carnaghan

Intrusion Detection

Intrusion Detection is the process of monitoring an information system in order to determine if any action is being...

Sep 10 · 1 min read >
Intrusion Detection

Honeypots: To Lure or Not To Lure

Honeypots are sometimes used as an active defense mechanism for network security and provide a means for targeting attackers...

Sep 11 · 1 min read >
Honeypots

Managing Access to Information Resources

Security breaches caused by internal employees, consultants, business partners and any other individual or group of individuals that have...

Sep 18 · 1 min read >
Information Resources

More on Limiting Damage to Information Assets

Establishing and enforcing policies that limit employee access to sensitive data and IT systems are one of the most...

Sep 19 · 1 min read >
Limiting Damage to Information Assets

Post Authentication Methods

A lot of time can be spent in an organization firming up authentication and access control systems to ensure...

Oct 8 · 1 min read >
Post Authentication Methods

Usable Security? User Friendly Factors

In his article on usable security, Lampson (2009) asserts that usable security needs to begin with policy and how...

Oct 12 · 1 min read >
Usable Security

SQL Injection Explained

SQL injection has been a method of attacking databases through multiple tiers of application infrastructure for many years, MacVittie...

Oct 29 · 1 min read >
SQL Injection

Web Application Database Vulnerabilities to be Aware of

The use of malicious code attacks against web applications and more specifically, web enabled databases, is on the rise...

Nov 1 · 1 min read >
Web Application Database Vulnerabilities