Network Security and ISO 27001 / 17799 News
  Create an account
:: Home  ::  Downloads  ::  Your Account  ::  Forums  ::
Login
Nickname

Password

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.
 
Site Navigation
· Home
· Contribute Story!
· Downloads
· Encyclopedia
· Feedback Form
· Forums
· Infosecurity
· Iso17799-FAQ
· Legal
· Maillists
· Newsfeeds
· RFCs
· Search
· Stories Archive
· Surveys
· Top 10
· Topics
· Web Links
· Your_Account
 
User Info
Welcome, Anonymous
Nickname
Password
(Register)
Membership:
Latest: ZP29
New Today: 235
New Yesterday: 233
Overall: 92560

People Online:
Visitors: 55
Members: 4
Total: 59

Online Now:
01: NCarrasco
02: ZP29
03: ABiaggini
04: JTqr
 
Who's Online
There are currently, 55 guest(s) and 4 member(s) that are online.

You are Anonymous user. You can register for free by clicking here
 
BS7799 and ISO 17799
The following resources should prove to be good starting points for the standards:

Theory & information:
BS7799 & ISO 27001
Official downloads:
BS7799, ISO 17799, ISO 27001
User group for both:
ISO 17799, ISO 27001

 
Survey
Have security issues stalled VoIP deployments within your company?

Yes
No



Results
Polls

Votes 140
 
PacketDefense: Information Security and BS7799 / ISO 17799 News

Please complete our *FREE* quick and easy registration process to obtain access to our large download section of Security tools and our online, searchable Information Security Dictionary. The latter contains hundreds of searchable definitions, and is an excellent resource for those studying for the CISSP exam.

We have an ever growing database of downloads which includes various flavors of Linux firewalls, Intrusion Detection tools, Forensics tools and more. If you are a supplier, feel free to add your favorite security download to the database. New: The Latest Information Security News: constant up to the minute news feed for information security.

Register and post your security questions to our forums!


Finally, please check out our sponsors. They help offset the significant costs associated with hosting and running the portal.


PacketDefense and BS7799 / ISO 17799 / ISO 27001

As the international information security standard (BS7799 / ISO 17799 / ISO 27001) is becoming widely adopted, PacketDefense will be launching a new section dedicated to this. This will be opening soon. Any contributions to this will be most welcome.

Hackers of the Lost Ark
Network and Computer Security NewsAnonymous writes ""Counter Hack" author Ed Skoudis presents HACKERS OF THE LOST ARK, another of his popular Crack-the-Hacker challenges. Going along with Ed's usual flair of adventurous back-story (this one no doubt inspired by the 1981 blockbuster "Raiders of the Lost Ark") we learn that just after archeologist Indiana Jones had retrieved the all powerful Ark of the Covenant from the Nazis, it was secretly stored away in a giant warehouse by the United States Government, never to be found again... That is until of course, a group of evil Neo-Nazis hacks into the Government's prototype server holding sensitive information of the Ark's exact location...and suddenly a whole new adventure begins and your forensics skills are beckoned! Ed himself is offering prizes to the top three sleuths. The challenge runs until July 2nd "
Posted by admin on Sunday, August 08 @ 21:39:31 CDT (7837 reads)
(Read More... | Score: 4.5)
Americas Most Wanted
Reviews and InformationAnonymous writes "AMERICA’S MOST WANTED STEPMOTHER is Exposed in New Book NO GREATER DECEPTION A True Texas Story by Sydney Newman Dotson

Author and Former IBM Director of Corporate Business Intelligence Recounts How She Was Tested Personally and Used Professional Investigative Skills to Write this book. HOMELAND SECURITY Takes on a New Meaning with New Book NO GREATER DECEPTION A True Texas Story. IDENTITY THEFT Inside the Home Places Family Assets and Securities at Risk when a Dispute over a Suspicious Will leads to a Showdown in Texas. Author Sydney Newman Dotson tells all in new book.

GUILTY or NOT GUILTY. YOU DECIDE the Degree of GUILT in NO GREATER DECEPTION A True Texas Story.

Evil Stepmother's IDENTITY THEFT Scams and Tools of the Trade are exposed. Body Language, Motive and Illegal Actions point to one Woman in this fantastic Who Done It Mystery. What was she thinking? Her plot and motives are obvious. Money, money, money. But how many people did she hurt along the way? Did she really think she could pull this off without doing Time in Prison? Was it worth the Risk?

A Probate Case of a Forged Last Will and Testament exposes Stepmother's ability to establish a second signature for her husband, and forge multiple documents to gain family securities and investments. It's a grand attempt to disinherit the husband's six children and get rich at their expense. It contains the best of the movie CATCH ME IF YOU CAN and the Anna Nicole Smith Trial in one book.

"It's a real life Texas Soap Opera of Love, Death, Betrayal and Justice. Move over Dallas, here comes Houston!" says Liz Carpenter, Author and Lady Bird Johnson WHITE HOUSE Press Secretary.

"Hold onto your bootstraps! If you liked Erin Brockovich, you'll be thoroughly intrigued with the adventures of these two sisters, their knack for investigative work, and their family in Texas. The author will take you on a gut-wrenching roller coaster ride that occurs after her father dies and her stepmother produces a suspicious Last Will and Testament that leaves the stepmother the entire estate. What Sydney discovers makes her question everything she once thought was real.

Was it normal for Joe Bonanno and other well-known gangsters to visit her home? How involved was her father in the gambling and prostitution rings along the Galveston Bay? Were his connections to George Bush, Lyndon Johnson and Joe Bonanno much deeper than they seemed? Was he truly involved in the JFK assassination?

What she learns about her stepmother Betty is devastating. How did the town whore come to marry her father the Police Chief? Did she kill her only brother and forge her own father's Will too? Just how many accomplices does she have? Are some of them Sydney's own brothers and sister? What the forensic document expert discovers will send chills up and down your spine.

Sydney has 20 years corporate strategy, sales and marketing experience with EDS, IBM and Compaq. As IBM's first Director of Corporate Business Intelligence, Sydney created IBM's Global Business Intelligence Network, Global Market View and Field Intelligence Posse. The new programs she brought to IBM were utilized to measure corporate performance and provide competitive benchmarking to support IBM's Board of Directors and Worldwide Executive Council.

Sydney's family has been blessed with a long line of sheriffs, judges and military officers including General George Armstrong Custer. This strong ethical upbringing inspired her to write this book.

NO GREATER DECEPTION is available on AMAZON.COM, AMAZON.CO.JP, AMAZON.CO.UK, AMAZON.FR, AMAZON.DE, AMAZON.CA, and BARNES and NOBLE.com websites today.
"
Posted by admin on Sunday, December 05 @ 18:37:36 CST (8798 reads)
(Read More... | Score: 2.5)
Applied Computer Forensics and Incident Response
Information Security and the LawAnonymous writes "ReDvolution Technologies today announced the arrival of their much-anticipated Applied Computer Forensics and Incident Response class to be launched onboard one of their week long cruises this November, 2003. The ACF class will be introduced in partnership with Tech Assist, Inc. This in-depth class is the only information systems forensics class available that so completely covers the processes and procedures, tools and techniques, and technical skills required to quickly and accurately handle a system or network compromise or misuse investigation.

Topic related resource: Computer Forensics World "
Posted by admin on Wednesday, October 29 @ 08:53:26 CST (9759 reads)
(Read More... | 3455 bytes more | Score: 1)
Secure Root Vulnerability Assesment Report
Anonymous writes "There is a news confirming the public availability of the announced
vulnerability assesment report by the No
Secure Root Group Security Research .
The report tells the form that a member of the group ( Lorenzo Hernandez
Garcia-Hierro ) used for
compromise the NASA websites using discovered vulnerabilities by
Lorenzo,Lorenzo could accesss
the administration system of NASA websites and then he made a complete
report about it , he was
communicating with NASA staff for solve the security problems that could be
used to compromise
the enterity of the system by sql injections , xss attacks and access to
administrative sections that were
not protected against remote access.
John R. Ray Mgr. of the NASA Competency Center ( Information Technology
Security ) contacted
Lorenzo and hi provided inmediately an access code to a secured part of
NSRG-Security servers netowork
for read the report and patch the systems.
Now the systems are patched and the NSRG-Security made public the report
about the important security holes
found.
Under a restrictive disclaimer it is available at:

Report / Advisory :
http://advisories.nsrg-security.com/Nasa.gov-MV/
Log with NASA communications made between Lorenzo and NASA staff:
http://advisories.nsrg-security.com/Nasa.gov-MV/mail-log.txt
Screen Shots related:
http://advisories.nsrg-security.com/Nasa.gov-MV/screenshots/

The question is , are the websites secured against the next generation of
attacks ?
A new way to compromise systems have been opened, is it the future of the
next generation of hackers ?
"
Posted by admin on Wednesday, October 29 @ 08:52:45 CST (8432 reads)
(Read More... | Score: 4)
AKCP SensorProbe8-X20
Anonymous writes "AKCP announces the next generation intelligent, snmp based remote dry contact manager, the sensorProbe8-X20, can monitor up to 28 dry contact inputs. AKCP a company that provides easy-to-use, web-enabled products for remote environmental, power and security monitoring, announces the release of its latest product in the sensorProbe™ family of monitoring devices; The sensorProbe8-X20 The sensorProbe8-X20 is the next generation dry contact device from AKCP. The SP8-X20 comes in a 1 U rackmount box with 8 full autoSense RJ45 ports for connecting any of AKCP’s intelligent sensors. An additional 20, 2 wire dry contact ports are provided giving a total of up to 28 dry contact ports. The specially designed 2 wire dry contact ports are easy to use and allow you to make your own dry contact cables quickly and easily. The SP8X 20 is a completely embedded host and comes with a proprietary Linux-like Operating System. It is equipped with a TCP/IP stack, internal web Server, e-mail, SMS and Full SNMP functionality. It also comes with an optional, high-speed, TI DSP and 16-bit A/D Converter for the specific requirements of special projects, such as integrating power monitoring. The SP8-X20 is virtually a ‘plug n play’ device and is extremely easy to use and maintain. The installation process is also simple and one does not need additional power supply or batteries when new optical sensors are added. The sensorProbe8-X20 is supplied with full snmp and a complete MIB allowing its interface to SNMP based Network Management systems such as HP OpenView®, IBM Tivoli®, What's Up Gold and others. “Many different types of equipment use dry contact outputs to send alarm signals to remote panels, remote monitoring systems, and building management systems. Communicating the status of these dry contact systems is important in a complex Enterprise network, or automation industry to protect the mission critical installations of expensive equipment. The sensorProbe8-X20, has many advanced features, will fulfill most customers monitoring needs, while still fitting into tight budgets” said Prakash Marar, Director Marketing, AKCP. "
Posted by admin on Friday, July 18 @ 00:00:00 CDT (8075 reads)
(Read More... | 2835 bytes more | Score: 2.66)
CERT Advisories
Currently there is a problem with headlines from this site
 
Top 10 Active Viruses
·Troj/Invo-Zip
·W32/Netsky
·Mal/EncPk-EI
·Troj/Pushdo-Gen
·Troj/Agent-HFU
·Mal/Iframe-E
·Troj/Mdrop-BTV
·Troj/Mdrop-BUF
·Troj/Agent-HFZ
·Troj/Agent-HGT

read more...
 
Report Incident
-How to Report Internet Related Crime

-Report Computer Threat/Intrusion to NIPC/FBI (Online Form)

 
PacketDefense Associates


Infragard/FBI



Root Secure

Help Net Security

BCVG Network Security






.:Link to Us:.

PacketDefense
Set to your default home page!

 
Search


 
Viral Hoaxes
·1 Hotmail hoax
·2 Budweiser frogs screensaver
·3 Bonsai kitten
·4 Olympic torch
·5 MSN is closing down
·6 A virtual card for you
·7 Meninas da Playboy
·8 Bill Gates fortune
·9 JDBGMGR
·10 Justice for Jamie

read more...
 
Security Resources
Network Security Policies
CISCO
ISO 27002, ISO 27001
 
http://www.packetdefense.com. Network security and BS7799 / ISO 17799 / ISO 27001 News
© 2003 PacketDefense. Network Defense in Depth using ISO 27000
Web site engine's code is Copyright © 2003 by phpnuke dot org. All Rights Reserved. PHP-Nuke is Free Software released under the GNU/GPL.
Page Generation: 0.444 Seconds