Learn More
Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL's responsibilities(More)
With funding from NSF the Department has set up a stand alone lab for students to learn penetration testing techniques(attack), to harden their networks against these attacks (defense) , and also to gather enough evidence to through careful logging and audit controls to convict a hacker (convict). Linux RedHat 7.1 was used and all the machines were set up(More)
R outing—the process of determining paths to move packets from source to destination— is fundamental to network op­ eration. Everyone in IT is familiar with routers and firewalls; they're the essential components of every organization's network defense. But what about routing between organizations? Interdomain rout­ ing vulnerabilities can lead to de­ nial(More)
O ur goal, of course, is to offer ideas to improve IT security, both by looking at ways it can go wrong as well as by covering good practices. As most security practitioners and researchers have seen, new technology develop­ ments nearly always introduce a period in which attackers find relatively easy ways to exploit weaknesses, followed by a gradual(More)
R outing—the process of determining paths to move packets from source to destination— is fundamental to network operation. Everyone in IT is familiar with routers and firewalls; they're the essential components of every organization's network defense. But what about routing between organizations? Interdomain routing vulnerabilities can lead to denial of(More)
I T systems have long been at risk from vulnerable soft­ ware, malicious actions, or inadvertent user errors, in ad­ dition to run-of-the-mill natural and human-made disasters. As we discussed in the last issue (" Sur­ viving Insecure IT: Effective Patch Management, " pp. 49–51), effec­ tive patch management is essential for shoring up security vulnerabil­(More)
  • 1