What is network security?

Introduction

A computer network, or in other words simply a network, is a collection of computers and other hardware components interconnected by communication channels that allow sharing of data, resources and information [1]. Adopt for both_ private or public needs, which are used in everyday tasks to conduct transactions and ...

more ...

Analyses of Malware Files

PURPOSE

The main goal of laboratory report is to identify three analyses of malware files from the archive file send by the lecture. The archive contains 89 malware files. The way how we choice 3 files is by following algorithm:

  1. Soft them by name
  2. First use last number of your ...
more ...

Company Brochure and Founder Notes, Cybersecurity.mk

COMPANY BROCHURE: Cybersecurity.mk

Your IT infrastructure could be taken under the shoulder of professionals

September 2012

Founder Notes:

Recently, Macedonian government has announced to open a CERT agency. This news was not only shock to us, but to everyone else, indeed. However, we are supporting this initiative and hope ...

more ...

Identify Possible Infection of Malware Into the Wireshark Capture File

INTRODUCTION

The main goal of laboratory report is to identify possible infection of malware into the wireshark capture file. The report should highlight the following aspects:

  • Download [not avaibale anymore]

  • Find malware download in this pcap and extract malware or malwares find out where malware was downloaded from.

  • What malware ...

more ...


What is wireless network security?

Introduction

The first wireless telecommunications was established in early 20th century, within successful transmitted radio signal across Atlantic Ocean. And it was known as the first wireless communication across the ocean. However, in this time likewise the computers were not widespread, the inventors and developers of wireless have not had ...

more ...




Clever solution by making site more resilient by optimization

PURPOSE & SCENARIO

The objective of this laboratory test, scenario is to make explore alternative “clever” solutions (as opposed to making the site more resilient by optimizing it) to protect your site against attacks. Moreover, DDoS [1] attacks, malicious code, etc.

Therefore, we need to develop countermeasures for the working attacks ...

more ...

Testing SNORT – IDS rulesets

SCENARIO

The objective of this laboratory test, scenario is to create a solution and instructions for testing an IDS^1^ systems usefulness for detecting attacks against a wordpress site. In addition, we have to develop/download/find/whatever a SNORT configuration (rulesets, preprocessors, whatever) that performs better than the default ...

more ...

Virtual Machine Malware / Malicious Analysis

INTRODUCTION

The main goal of laboratory report is to identify possible infection of two Windows 7 virtual machine. Virtual machines presented by the lecture:

  • Win 1
  • Win 2

The assignment is following:

  • Find out what is infecting the machine win1
  • Understand which way is the current malware dangerous to “your ...
more ...

Security Programing Techniques

INTRODUCTION

The main goal of this post is to introduce the reader with the security programing techniques into deferent program languages and operating system security models. The post is introducing four following topics:

  1. Session storage’s in Ruby on Rail
  2. Parameterized statements into Java with JDBC, C# with ASP.NET ...
more ...

Honeypot document

INTRODUCTION

The main goal of laboratory report is to identify possible leaked/stolen information, documents from our system without recognising that attacker had an access. Thus access of the document will inform us immediately with the information of the burglar. The report should highlight the following aspects:

  • Constructed an document ...
more ...