What are the countermeasures against sniffer attacks?

September 15, 2008 0 Comments 0 tags

It is quite difficult to overcome sniffer attacks. However, the following steps can be taken as countermeasures against such attacks: * Use encrypted protocols for all communication. * Segment the

What are the countermeasures against database attacks?

September 14, 2008 0 Comments 0 tags

The following are the countermeasures against database attacks: * Input Sanitization: The Database Administrator must sanitize any input received from a user. The data submitted should be checked for data

What are the components of a security evaluation?

September 12, 2008 0 Comments 0 tags

Any security evaluation involves three components: * Preparation: In this phase, a formal contract is signed between an ethical hacker and the authority of the organization that contains a non-disclosure

What are the advantages and disadvantages of honey pots?

September 11, 2008 0 Comments 0 tags

Honey pots have several advantages, which are as follows: * Small set of data: Honey pots collect small amounts of data, but almost all of this data is about real

What are cryptographic attacks?

August 25, 2008 0 Comments 0 tags

Cryptographic attacks are methods of evading the security of a cryptographic system by finding weaknesses in such areas as the code, cipher, cryptographic protocol or key management scheme in the

How does the form-based authentication scheme work?

August 19, 2008 0 Comments 0 tags

The form-based authentication scheme works in the following manner: * A client generates a request for a protected resource (e.g. a transaction details page). * The Internet Information Server (IIS)

IP spoofing

August 13, 2008 0 Comments 0 tags

IP spoofing is about the most advanced attack that can be executed on a computer system. IP spoofing, if done correctly, is one of the smoothest and hardest attacks on