security

1 October 2013 at 12:03pm
Category Count Compromise 128 Copyright 1 Denial of Service 4 General Query 2 LEA Query 2 Legal/Policy Query 0 Malware 420 Net/Security Query 4 Other 11 Phishing 49 Scanning 30 Social Engineering 0 Unauthorised Use 2
1 October 2013 at 12:00pm
Category Count Compromise 111 Copyright 3 Denial of Service 7 General Query 8 LEA Query 5 Legal/Policy Query 3 Malware 336 Net/Security Query 8 Other 16 Phishing 44 Scanning 45 Social Engineering 0 Unauthorised Use 9
1 October 2013 at 11:58am
Category Count Compromise 74 Copyright 3 Denial of Service 9 General Query 7 LEA Query 2 Legal/Policy Query 1 Malware 567 Net/Security Query 12 Other 11 Phishing 36 Scanning 26 Social Engineering 1 Unauthorised Use
15 October 2013 at 1:05pm
You may be aware of the launch by the government of CISP - the Cyber Security Information Sharing Partnership. It's a web based environment in which various sector communities can come together to share information and collaborate on common threats and incidents. The focus is very much on operations and people who are in positions to take action to defend their organisations. There's a framework based on the Traffic Light Protocol for how far information can be shared.
18 April 2013 at 11:12am
Category Count Compromise 30 Copyright 17 Denial of Service 13 General Query 3 LEA Query 2 Legal/Policy Query 1 Malware 287 Net/Security Query 7 Other 9 Phishing 26 Scanning 39 Social Engineering 0 Unauthorised Use 3
28 March 2013 at 9:31am
Category Count Compromise 22 Copyright 22 Denial of Service 10 General Query 3 LEA Query 1 Legal/Policy Query 1 Malware 268 Net/Security Query 3 Other 13 Phishing 28 Scanning 27 Social Engineering 0 Unauthorised Use 2
7 October 2013 at 1:04pm
This course aims to provide an overview of the security aspects of computer networks from the managerial perspective and focuses on prevention through effective policy and procedures. This is supported by an opportunity for delegates to discuss issues with their peers and the course facilitator.
7 October 2013 at 1:04pm
This course will benefit staff (and their managers) whose jobs require them to have privileged access to shared networks, computers and applications: for example system and network administrators and those responsible for the administration or content of databases. Familiarity with operations requiring enhanced privileges and prior knowledge of the organisation’s own published privacy policies would also be useful.
12 February 2013 at 10:04am
Denial of service (DOS) attacks are comparatively rare amongst the types of security incidents that are reported to Janet. The majority of DOS attacks are unsophisticated and subsequently short-lived, causing only minor issues for us due to our network capacity.
Subscribe to security