security

24 February 2014 at 10:58am
This course provides an introduction to the technology and the different methods of virtualisation available. Networking and Security concerns are explored in further detail, as critical elements to deployment. The second part of the course covers the application of Cloud Computing in more detail.
6 February 2014 at 9:47am
On Tuesday I had the opportunity to read and provide feedback on the first draft of the government's "Implementation Profile for Basic Cyber Hygiene". This document comes as a result of their consultation last year on "Cyber security organisational standards".
24 January 2014 at 1:58pm
Detecting and efficiently responding to incidents, especially those where critical resources are exposed to elevated risks is important for any organisation. This course is designed to share best practice in incident response, and provide hands on scenario-based activities to develop participants understanding and to enable them to apply this within their site. Topics Covered
The statistics provided by Jisc's Janet network CSIRT require a degree of interpretation. Often the numbers are influenced more by the team's activities than they are by external influences. For example: an increase in the number of malware incidents may indicate increasing infections, but it is just as likely to be due to increased detection rates by CSIRT.
5 December 2013 at 4:09pm
You can call CSIRT for help   If you suspect that your institution is suffering from a DDoS attack you can call on Janet CSIRT for assistance. We can help you understand and analyse the traffic, and in most cases can work with our network operations centre and transit partners to filter traffic. Where possible we work with other network providers to eliminate the sources of the attack.  
6 November 2013 at 9:27am
Category Count Compromise 6 Copyright 4 Denial of Service 12 General Query 4 LEA Query 2 Legal/Policy Query 0 Malware 778 Net/Security Query 2 Other 21 Phishing 34 Scanning 22 Social Engineering 1
29 October 2013 at 11:06am
Following on from our messages and briefing at the start of the year, DDOS attacks are continuing to occur at a greater frequency than they have in previous years. We have been working to assist affected customers when they happen. Many of the attacks make use of unauthenticated UDP based services to reflect and amplify traffic against the chosen target. Open DNS resolvers (53/udp) and increasingly CHARGEN (19/udp) are the two most abused services. It's not unusual to see attacks in the order of 10Gb/s.
1 October 2013 at 12:05pm
Category Count Compromise 7 Copyright 0 Denial of Service 9 General Query 4 LEA Query 1 Legal/Policy Query 0 Malware 424 Net/Security Query 2 Other 17 Phishing 33 Scanning 18 Social Engineering 1
1 October 2013 at 12:03pm
Category Count Compromise 128 Copyright 1 Denial of Service 4 General Query 2 LEA Query 2 Legal/Policy Query 0 Malware 420 Net/Security Query 4 Other 11 Phishing 49 Scanning 30 Social Engineering 0
Subscribe to security