6 July 2012 at 10:24am
Category Count Compromise 62 Copyright 119 Denial of Service 3 General Query 4 LEA Query 2 Legal/Policy Query 0 Malware 153 Net/Security Query 13 Other 15 Phishing 19 Scanning 42 Social Engineering 1 Unauthorised Use
PB/INFO/016 Most computer users will have been very grateful for the existence of backups. Although they are often seen as a way to recover files lost due to typing errors or misplaced mouse clicks there are other reasons to make and keep secure copies of files. However each of these purposes creates different requirements for the backup and recovery system, so it is important to be clear which purpose is involved and choose an appropriate backup strategy and technology to deliver it.
Isolated individual computers are relatively secure as long as their physical well-being is ensured and regular backups are carried out to protect the integrity of the data held. However, once computers are connected to a LAN or WAN, they become exposed to threats which may jeopardize their proper operation and the safety and privacy of the data held.
Open relays allow any combination of origin and destination address, and are frequently abused by advertisers and others to distribute UBE. This will usually overload an organisation's mail server, affecting its ability to handle legitimate mail, and often leaves the organisation with a flood of complaints and error messages to deal with. Sites that are frequently abused as relays may be added to blacklists used by many network operators and ISPs to reject all e-mail and other traffic. Advice on preventing relaying is available from the MAPS website:
Many organisations are looking to have some form of penetration testing performed on their systems. This may simply be to evaluate existing security measures and to find gaps where security needs improvement, but increasingly it is performed to comply with security standards when connecting to public sector networks or processing payment details.
15 October 2013 at 1:05pm
The event will include presentations from the community and cover a range of topics within computer and network security. This event is primarily aimed at the Janet security contacts and those responsible for user, campus, site and network security. Please note it is only open to sites with a Primary connection to Janet. Online booking and further information will be available after August
Subscribe to security