Uncategorized

Ransomware4-How to prevent

Network security appliance/protection 1 Firewall/WAF 2 IPS 3 Endpoint security/Antivirus Risk and Security Management 1 Security awareness 2 Security policy Customized security solutions 1 Heterogeneous network design 2 Zero-trust network design Data management 1 Data at rest 2 Data in motion 3 Data in use 4 Data backup Recovery Plan 1 Data recovery 2 Infrastructure […]

Ransomware4-How to prevent Read More »

Ransomware2-Why Ransomware attack happened again and again

What we have for defending security attacks 1 Physical control methods 2 Technical control methods 3 Management methods Why Ransomware happened in highly secured IT environment 1 They are high-value targets, and they are will to pay ransom for their data/services 2 Lack of security awareness as usual 3 IT security system(Security appliance, Endpoint security,

Ransomware2-Why Ransomware attack happened again and again Read More »

C&C++ Secure Programming Quick Guide

Simplifying coding Coding No unsafe library function callsNo unchecked access/write Fail-secure as default Limited resource consumptionSeparate Data plane and Control planeRobust module interfacesTimeout all failed connectionsInput validation Minimize platform dependentMinimize shared or global valuesMinimize threads locks or other race conditionsMinimize PrivilegesMinimize error handling messagesMinimize type castings of pointers, use void type pointers if necessary because the

C&C++ Secure Programming Quick Guide Read More »

Hardening GNU/Linux OS

Facts: Original GNU/Linux Distributions is NOT as secure as it seems. Baseline security Use single GNU/Linux distribution as baseline system if possible. Before you begin to harden GNU/Linux hosts, make sure all your Linux OS are up to date. Setup a strong password policy, password complexity, password change rules, make sure different systems use different

Hardening GNU/Linux OS Read More »