News

Data Security

Prevent cyber crime and protect your security online

Minggu, 29 Mei 2011
Cyber crime threats rise each year because too many people are unaware of the security risks involved when using the Internet. The Internet has become an integral part of society. Users need to learn how to protect themselves from online theft. Cyber crime involves unauthorized access to your computer when you unwittingly install malware--viruses, worms, spyware or trojans. Without realizing it, you can find yourself the victim of identity theft when you are tricked into gi...

More Security With SSL Secured Website

Rabu, 25 Mei 2011
Getting a more secure web is made easier with the help of SSL Secured Website. You may be wandering what SSL is? Well, SSL is a short for Secure Socket Layer. This is a protocol defined for private documents over the web. The main concept is that the SSL Secured Website uses a cryptographic system. The system normally deals with the two keys- one that is public and known to everyone while on the other hand there is a private key that is only known to the recipient of the mess...

Traditional Security Methods are Insufficient

Selasa, 3 Mei 2011
Network firewalls and Intrusion Prevention Systems (IPS) attempt to identify SQL injection via traditional signature-based protections. The most common way of detecting SQL injection attacks is by looking for SQL signatures in the incoming HTTP stream. For example, looking for SQL commands such as UNION, SELECT or xp_. The problem with this approach is the high rate of false positives. Most SQL commands are legitimate words that could normally appear in the incoming HT...

Preventing SQL Injection with SecureSphere Application Data Security Solutions

Jum`at, 22 April 2011
The Imperva SecureSphere Web application firewall features advanced protection against SQL injection attacks and incorporates a multi-layer security model that enables precise attack protection from SQL injection without the need for manual tuning. SecureSphere's security architecture incorporates both dynamic positive (white list) and dynamic negative (black list) security models. Robust enforcement algorithms draw on both security models to identify and block even th...

Viruses and Worms are Examples of Malicious Code

Sabtu, 12 Maret 2011
What is cyber security? It seems that everything relies on computers and the internet now — communication (email, cellphones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's syste...
« Previous | 1 | 2 | 3 | 4 | 5 | Next » | »»»