ICSAP – Interactive Cyber Security Awareness Program

Abstract

Currently, humans coupled with the socio-technical aspect can be either the strongest or the weakest link in any information security system, and the key in security lies in delivering awareness training through short and effective online videos, whereby the participator can gain knowledge on security. Our aim, therefore, is …

more ...


What is network security?

Introduction

A computer network, or in other words simply a network, is a collection of computers and other hardware components interconnected by communication channels that allow sharing of data, resources and information [1]. Adopt for both_ private or public needs, which are used in everyday tasks to conduct transactions and …

more ...

Company Brochure and Founder Notes, Cybersecurity.mk

COMPANY BROCHURE: Cybersecurity.mk

Your IT infrastructure could be taken under the shoulder of professionals

September 2012

Founder Notes:

Recently, Macedonian government has announced to open a CERT agency. This news was not only shock to us, but to everyone else, indeed. However, we are supporting this initiative and hope …

more ...

Identify Possible Infection of Malware Into the Wireshark Capture File

INTRODUCTION

The main goal of laboratory report is to identify possible infection of malware into the wireshark capture file. The report should highlight the following aspects:

  • Download [not avaibale anymore]

  • Find malware download in this pcap and extract malware or malwares find out where malware was downloaded from.

  • What malware …

more ...


What is wireless network security?

Introduction

The first wireless telecommunications was established in early 20th century, within successful transmitted radio signal across Atlantic Ocean. And it was known as the first wireless communication across the ocean. However, in this time likewise the computers were not widespread, the inventors and developers of wireless have not had …

more ...


Clever solution by making site more resilient by optimization

PURPOSE & SCENARIO

The objective of this laboratory test, scenario is to make explore alternative “clever” solutions (as opposed to making the site more resilient by optimizing it) to protect your site against attacks. Moreover, DDoS [1] attacks, malicious code, etc.

Therefore, we need to develop countermeasures for the working attacks …

more ...

Testing SNORT – IDS rulesets

SCENARIO

The objective of this laboratory test, scenario is to create a solution and instructions for testing an IDS^1^ systems usefulness for detecting attacks against a wordpress site. In addition, we have to develop/download/find/whatever a SNORT configuration (rulesets, preprocessors, whatever) that performs better than the default …

more ...

Security Programing Techniques

INTRODUCTION

The main goal of this post is to introduce the reader with the security programing techniques into deferent program languages and operating system security models. The post is introducing four following topics:

  1. Session storage’s in Ruby on Rail
  2. Parameterized statements into Java with JDBC, C# with ASP.NET …
more ...

Honeypot document

INTRODUCTION

The main goal of laboratory report is to identify possible leaked/stolen information, documents from our system without recognising that attacker had an access. Thus access of the document will inform us immediately with the information of the burglar. The report should highlight the following aspects:

  • Constructed an document …
more ...

Testing IDS

SCENARIO

The objective of this laboratory test, scenario is to create a solution and instructions for testing an IDS\^1 systems usefulness for detecting attacks against a wordpress site. In addition, a repeatable process to evaluate vendor claims. Whatever passive IDS system sample delivered as a VM or a dedicated …

more ...

Script Kiddie

PURPOSE and SCENARIO

The goal of this laboratory test is to make effort to attack server and to deface website. Here is the scenario: your client is worried about some stuff posted on a blog. They ask You to take care of it. They have a throwaway “script kiddie”[Script …

more ...