Cyber security starts here - awareness of social engineering

Submitted by media on Sat, 03/21/2015 - 14:02

Social engineering methods and means for obtaining information have been around for ages.

 

They seem like simple requests or benign coordinated events, but the truth is that social engineering often exploits your most valuable asset.  Your users.  A compromised user can then be used to wreak havoc or throw deeper hooks into the targeted network.  Most network hacks are incremental in nature with an attack vector that often times leads to a compromised user, admin, or super user.

Cyber security starts here - Cybersecurity Framework, Compliance

Submitted by media on Sat, 03/21/2015 - 02:02

 

NIST (National Institute of Standards and Technology) has developed and published a Framework for Improving Critical Infrastructure and a Cybersecurity Framework.  This NIST framework contains a modernized set of standards and best practices that organizations can use to augment their risk management processes.  A complete copy of the NIST Framework in most current Version is available at

http://www.nist.gov/cyberframework

Cyber security starts here - harden windows servers

Submitted by media on Sat, 03/21/2015 - 01:01

 

Harden windows servers

Windows Server  has new security features, best practice wizards, and sleeker interfaces to enhance the security posture of the operating system installation.  Windows Server has a major install base and is relevant to cover for server hardening. Most settings are similar and familiar between the different Windows desktop and server versions.

Cyber security starts here - the Security Management Process

Submitted by media on Wed, 03/18/2015 - 04:04

A technically minor attack like a defaced web page may or may not be as devastating as a backend server breach.  What about a multi-vector DDoS (distributed denial of service) attack?  The security management process helps your organization get a better understanding of your attack surface i.e., exposure to risk.  It is important for your organization to perform your own risk analysis to determine how costly a data breach or offline system is.

Cyber security starts here - Size of the Cyber Security Problem

Submitted by media on Wed, 03/18/2015 - 04:04

Let’s get an idea for the size and scope of the cyber security problem. 

 

Billions of devices, from security cameras to corporate workstations to points-of-sale, are all attached in one way or another via this thing we often refer to as the internet of things.  To add some size to this problem we have billions of people all relying on this every day for work, healthcare, social, and government services amounting to a huge cyber dependent economy.  Projected growth in both population and reach of the internet is going to continue to grow this problem with raw numbers alo

Cyber security starts here - Introduction

Submitted by media on Wed, 03/18/2015 - 04:04

Introduction

Cyber security is both an active and comprehensive undertaking.  There is no firewall, magic antivirus, pop-up blocker, Java update nor VPN client that will protect you from everything.  A comprehensive approach starting with leadership that includes risk management, best practice implementations, and system hardening is needed to best protect your organization’s information assets. 

Jupiter's Great Red Spot, an astrophysical explanation

Submitted by media on Fri, 03/21/2014 - 16:04

Published July 13, 2017, from the notebooks of Jason Jarvis.

Our discussion of gravity and mass momentum of Jupiter has included Jupiter's composition, gravity, its rocky and icy moons, and the introduction of Body N.  This astrophysical brief focuses on Jupiter's great red spot.  How can this storm be visible and apparent for so long in Jupiter's upper atmosphere?

Back of the Hand Momentum/Velocity Calculations in Support of Jarvis Earth & Moon Origination and Planetary Formation Theory

Submitted by media on Fri, 03/21/2014 - 14:02

In previous physics briefs by Jason Jarvis, found at https://JarvisLabs.com/Jupiter, Jarvis illustrates and explains the origin of rocky or icy terrestrial planets from within the gas giants.  Jarvis hypothesizes that the Earth and Moon orbiting pair originated in the Jupiter system and are very close astronomical neighbors of Jupiter's Galileon moons.  This physics brief titled "Back of the Hand Momentum/Velocity Calculations in Support of Jarvis Earth & Moon Origination Theory" was realized when performing and contemplating thought experime

The Era of Reality Physics - Vacuum Potential with a Black Hole Theory

Submitted by media on Fri, 06/21/2013 - 20:26

This physics brief was initially authored by Jason Jarvis in June 2013, has lead to other findings and was finally published officially here in this form on April 12th, 2019.

 

Reality physics,  vacuum potential, the concept of a more perfect vacuum, lift, space propulsion advice, and the big bang never happened.

 

In order to explore and explain gravity mass momentum physics let's introduce the concept of a vacuum and space vacuum.  In our daily lives we think of a vacuum as a suction machine. 

Cyber security starts here - attack surface and the kill chain

Submitted by media on Wed, 03/21/2012 - 14:24

A network security breach of any kind consists of a series of events that lead to un-authorized access, dissemination of material, or degradation of critical information systems.  It is important to consider the behavior and methods that an attacker may employ to breach your network.  Attackers will leverage anything that presents itself such as a gullable end user, mis-configuration, or a vulnerable system service that is not patched or secured.