These articles focus on measures for securing network and OS-level aspects of IT infrastructure.
This succinct reference presents practical tips for examining a suspect system to decide whether to escalate for formal incident response.
This cheat sheet offers tips for assisting incident handlers in assessing the situation when responding to a qualified incident by asking the right questions.
This cheat sheet offers tips for battling a network distributed denial-of-service (DDoS) attack on your infrastructure.
This article explores the use of multiple firewalls for protecting resources according to business requirements of multitier applications.
This paper provides a detailed analysis of several anomalous network events, and illustrates the techniques for examining alerts and logs generated by a network intrusion detection system.
This report presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.
This paper documents a comprehensive architecture for defending network resources of a fictitious company. It illustrates an approach to setting up a strong security perimeter.
Copyright © 1995-2013 Lenny Zeltser. All rights reserved. RSS Feed.
The information on this site does not necessarily represent positions or opinions of my employer.