Anatomy of an Auditing System
An auditing system consists of three components: the logger, the analyzer, and the notifier. These components collect data, analyze it, and report the results.1. Logger Logging mechanisms record...
View ArticleDownload TrueCrypt 6.0, Free On the fly Encryption Software
TrueCrypt is a software application used for on-the-fly encryption. It can create a virtual encrypted disk in a file (container), which can be mounted as if it were a real disk. TrueCrypt also supports...
View ArticleIntrusion Detection Is an Art and a Science
Certain prerequisites are necessary to make an intrusion detection system worthwhile, including the following:• Network administrators with intrusion detection experience.• Network administrators with...
View ArticleThe Top 5 Internal Information Technology Security Threats
The top five internal security threats from ITsecurity.com1. Your Employees Are Selling You Out, Part 1 Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization in an...
View ArticleDownload Free Policy & Procedure Manager 4.5 for Regulatory Compliance Standards
The web-based Policy & Procedure Manager provides your staff with instant access to your organization's policies and procedures. It notifies those who are required to read specific documents and...
View ArticleWhat is FreeBSD Portaudit
FreeBSD Portaudit is a software vulnerability auditing software for Free BSD. The ports-mgmt/portaudit port polls a database, updated and maintained by the FreeBSD Security Team and ports developers,...
View ArticlePrinciples of Generally Accepted Information Security Principles (GAISP)
GAISP is based on a solid consensus-building process that is central to the success of this approach. Principles at all levels are developed by information security practitioners who fully understand...
View ArticleOneSixtyOne Fast SNMP scanner
onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. It can scan an entire class B network in under 13 minutes. It can be used to discover devices...
View ArticleDownload Lynis - Audit Tool for Linux
Looking for simple tools for audit your linux system security and configuration? you may try Lynis free at no cost.Download: http://www.rootkit.nl/projects/lynis.htmlLynis is an auditing tool for Unix...
View ArticleFive reasons why we need IT Auditor
1. There are significant development under information technology area especially those related with the interfacing and managing complex application.2. Auditors realized that computers had impacted...
View Article