Sunday, June 27, 2010

Cyber Security Threats


Cyber Security Threats - Organization and Definitions

The world of information security attacks and threats in growing in power and sophistication with nation backed Cyber attacks emerging. Although constituting isolated attacks so far the new wave of Cyber attacks are more prevalent and dangerous. And, with the advent of (often hostile) national

involvement in Cyber offensives, the risk to our nation's National Security is real and potentially devastating. This is particularly as the net expands in both scope and sophistication,

The world of Cyber Warfare, attacks and threats is real and potentially devastating to defense and commerce. While substantial efforts are underway to counter the threat, great effort is required to establish standard definitions and concepts.

And we, as a nation, are not ready to defend against a coordinated, powerful Cyber attack from within and well from beyond our shores. Although substantial dollars are budgeted for Information

and Cyber security, the management and planning for an effective long term defense against Cyber terrorists. Greater effort on planning and organizing defenses and offensive scenarios of Cyber Security is required and one of the first steps is the definition of Cyber/Information Terms and concepts.

In addition, greater organizational focus is required to properly mobilize and utilize the nation's resources. At present there are three major agencies (Defense Information Systems Agency (DISA), the National Security Agency (NSA) and the Department of Homeland Security (DHS). Each agency addresses the needs of a different sector of the Federal Community (military, intelligence and civilian) but there is significant overlap and duplication of effort. To this end, President Obama has proposed an oversight agency, (CyberCom) that will coordinate and integrate the efforts of the agency responsible for each sector. This should result in significant efficiencies in the prevention of Cyber Security attacks.

The world of Information Assurance/Cyber Security is very broad and many of the terms are often used interchangeably and many times wrong when defining a particular Information Assurance problem. What is needed to help reduce the high level of confusion is a list of standard terms that are universally accepted. A sample (but not exclusive listing ) of terms can be found at Information Security Types. This guide brings precision to the term usage of Cyber world terminology and provides a starting point or framework of understanding.

In addition, a centralized technical research database is required that operates in real time and is universally accepted by the entire cyber security community. This database would contain relevant classified and unclassified technical information about new products, processes and regulations that have proven effective against Cyber attacks. A research database has been developed by the Defense Technical Information Center (DTIC) and steps are underway to update and expand this tool in the fight against Cyber attacks. But, a great deal of effort is required before the initiative is truly powerful and accepted.

Friday, June 25, 2010

Guidelines to Fix Slow Computer Problems


Guidelines to Fix Slow Computer Problems

When your computer system performs in very slow performance, your convenience in working at your computer will be completely gone. Instead, you will feel very annoyed and frustrated in waiting your computer to respond your command. Actually, you do not need to get mad to handle this problem. When this problem occurs, you can try to fix it by doing some considerations. Just read this article to know more about fixing slow computer problem.

The first thing that you need to do is backing up all your data. Usually, your computer will be slower if you store too much data on it. Even if it is not the main cause of the slow performance, you still have to back up your data. Therefore, if something bad happen to your computer within the fixing process, you can still have your data with you. Simply back it up to your external hard disk. Or, you can also store your files on DVDs or CDs, but it needs more complicated steps to do.

Then, the second thing to do is removing your old programs from your computer system. Removing some old program could speed up the performance of your computer in significance level. Just sort some programs that are no longer used and remove them from the Control Panel. Here, you can find Add or Remove Programs that will allow you to select some programs that you are going to remove.

The third thing to do is removing the temporary files clutter. When you are using you computer for internet connection, there will be some temporary files and cookies stored on your computer. Removing those file will create bigger space in your computer memory and it will be helpful to increase the speed of your computer. Simply choose clear cache and cookies from the Options in your browser.

As the fourth steps to do, you can defrag your disk drive. This action will be very helpful to organize scattering individual components of the programs or files stored in your computer. When the scattered component has been organized well, your computer will have more speed in its performance. To defrag your hard disk, you can simply choose Accessories in the Start menu and find System Tools that contains Disk Defragmenter option.

If your computer still in slow performance, you can try to do registry cleaning. This is a kind of software that will go through your windows registry and removes or repairs registry-related issues that make your computer respond in slower way. Then, you should also check whether your computer system is infected by viruses or not. Virus is also one of the main common causes of slow computer performance, so you have to make sure that your computer is always updated.

By doing those simple action, you can easily fix your computer from slow performance. By having computer set with fast response and performance, you can save more time to finish your job and get more convenience in working at your computer.

Monday, June 21, 2010

KASHIF WASIM

Personal Information
First Name:
Kashif
Last Name:
Wasim
Gender:
Male

Contact Information
Email:
apnitiens@yahoo.com
Website:
http://www.guaidance.blogspot.com/
Country:
Pakistan

Interests & Activities
Hobbies:
Music,Traveling, NET Surfing, Watch Movies
Favorite Books:
Any Informative Book....!!!
Favorite Music:
Depending on Mode
Favorite Movies:
Fast and Furious, Out Lander, Mp3

Academic Information
Management Sciences BBA(Hons)

WAQAS AHMAD

Personal Information:

First Name:
WAQAS
Last Name:
Gender:
Contact Information:
Cell #: +92-333-5635026

Facebook:https://www.facebook.com/LIVE267
Twitter    :https://twitter.com/WAQAS267
Website:
City:
FAISALABAD
Country:
PAKISTAN

Interests & Activities:
Hobbies:
Music,Traveling , Adventure, Book Reading, NET Surfing
Favorite Books:
Any Informative Book....!!!
Favorite Music:
Depend on My mood  & My mood never Constant....!!!
Favorite Movies:
I Hate Movies...., Its Just Wastage of Time...

Academic Information:
MBA in Human Resource Management
BBA (Hons) in Human Resource Management 

Professional Information:
Employer:
Position:
Associate, Customer Care
Since:
2014

Sunday, June 20, 2010

Computer Forensics


What is Computer Forensics?

When an unauthorized incident occurs against your network, such as an attacker breaking though your network's defenses, an appropriate response is required. The response to the intrusion includes using forensic science to properly respond to the event.

Forensic science, or forensics, is the application of science to problems that are of interest to the legal profession and deals mainly with the recovery and analysis of evidence. Computer forensics attempts to retrieve information that can be used in pursuit of the attacker or criminal.

Computer forensics is also called digital forensics because its uses techniques to identify, collect, examine and preserve information or evidence, which is magnetically stored or encoded.

When your team responds to a criminal event that requires an examination using computer forensics, there are generally four basic steps that are followed.

  1. Secure the crime scene
  2. Collect and preserve evidence
  3. Establish a chain of custody
  4. Examine evidence

The first step in reacting to a computer forensics incident is for the first responders to secure the crime scene. The response team should document the physical surroundings of the computer or electronic device that is suspected of containing digital evidence. This includes photographing the area from different angles before anything is touched and labeling cables connected to the computer.

Additionally, the team should interview anyone who had access to the computer and take custody of the entire computer along with the keyboard, external memory devices, and peripherals.

Since digital evidence is easily altered or destroyed, only properly trained computer evidence specialists should process computer evidence in order to ensure that integrity is maintained and the data obtained can withstand scrutiny in a court of law.

The computer forensics team should capture any data that may be lost when the computer is turned off including:

  • RAM contents
  • Current network connections
  • Logan sessions
  • Network configurations
  • Open files

After the volatile data is preserved the team should create a mirror image backup of the hard drive. A mirror image backup, or bit-stream backup, is an evidence-grade backup that is admissible in court and must be done in a controlled manner by trained professional.

Establishing the chain of custody documents who had access to the evidence and when. Serial numbers should be recorded and the evidence should be kept under strict control at all times.

Finally, after the mirror image is created and the original system is secured, then the mirror image is examined to reveal evidence.

All data should be investigated for clues including:

  • Word processing documents
  • Spreadsheets
  • Emails
  • Caches
  • Cookies
  • Meta data
  • Database entries

Additional sources of hidden clues may come from RAM Slack or Drive Slack. When Windows computers use memory to process data information that has been created, viewed, modified, downloaded, or copied it may still be available.

Tuesday, June 15, 2010

Computer Network Defense (CND) And the Intelligence Community


Computer Network Defense (CND) And the Intelligence Community - A Higher Level of Security By John

There are three sectors of the Federal Government that are vitally concerned with Computer Network Defense and the Intelligence Community adds an additional level of security because of the classified nature of community activities.

As a result, contractors that provide Computer Network Defense (CND) services are held to even higher standards than the usual high requirements of vendors for Cyber Security projects.

The concept of Computer Network Defense includes a broad menu of services that provide an infrastructure against cyber attacks from domestic and international sources. While each agency has specific Cyber Security needs and protection of classified data and information, a general roadmap can be developed and used as a template for individual users.

General Objectives:

In general, contractors that perform Computer Network Defense Services are tasked to meet four objectives.

· Recommending architectures, software and hardware
· Implementing the government approved solution
· Performing operations and maintenance of the CND program
· Insuring that security requirements for classified material are met ( a higher level of security requirement)

The contractor is also required to make regular formal reports and/or briefings detailing status and accomplishments in the various CND functional areas.

Specific CND duties include, but are not limited to:

Deployment:

Deployment requires the contractor to develop all hardware and software required to establish a state of the art Cyber Security Defensive network that will improve defenses, ensure that the systems operate properly and monitor activities on a day to day basis. It is important that the entire deployment effort coordinates with the agency security office to ensure that the protection of classified data is not compromised. Deployment usually includes:

· Deploy, maintaining, and monitor and harden agency's perimeter defenses on all classified and unclassified networks
· Deploying, operating, maintain, monitor, and harden agency's intrusion detection capability on all classified and unclassified networks
· Operating, maintain, monitor and harden agency's Domain Name Servers(DNS) on all classified and unclassified networks

Manage Assist and Support:

Additional support is often required in the form of identification of new products/technology that enhance the security of the network. Since Cyber Security is in a rapid development phase, new products and technology are constantly emerging. Some of this technology is good and some is not useful. Qualified decisions are required to pick the best applicable technology.

A sample of additional support includes:

· Working closely with engineering and operations for the installation and configuration management of CND devices on agency's networks
· Performing software and hardware vulnerability scans on all classified and unclassified networks and systems
· Managing, and monitoring the enterprise anti-virus program
· Providing assistance and guidance in the development of system and network security plans
· Managing and monitoring the system and network audit log reviews for all networks and systems

Testing and Reporting:

Continuous testing of the system is the best way to identify and preclude future cyber attacks on a regular basis. Based upon testing, decisions can be made to improve the performance of the Cyber Security network. Included in this process are the following steps:

· Identifying anomalous activity in an audit log immediately to the government manager
· Performing network and system security plan compliance testing
· Reporting noncompliance with system and network security plans immediately to the government manager
· Executing software, hardware, and configuration vulnerability scans on all agency systems and networks
· Working closely with agency's security office in the development, implementation, and management of agency's system security program
· Managing, and monitoring the removable media access control program on all agency systems and networks

Compliance and As Needed Support:

The critical nature of Computer Network Defense means that standards and regulation must be met and complied with to insure success of the program. This includes:

· Supporting the Information Assurance Vulnerability Alert (IAVA) and Information Condition programs; developing and maintaining agency's information systems security officer professional development program
· Reviewing updated developments on all applicable standards and regulation to ensure that the network is in compliance
· Providing as needed incident response support for, hacker attacks, cyber-terrorist attacks, and virus, worm, Trojan horse, and other malicious code incidents
· Develop, install, manage, and maintain the PKI infrastructure on all agency networks and systems

Documentation and Technical Representation:

In order to establish a program that future users can comply with and benefit from, complete and accurate documentation is required. In addition compliance with Intelligence Community Standard Operating Requirements, particularly as regards security of classified information is mandatory. This process includes:

· Documentation of practices, policies, requirements, training, Standard Operating Procedures, and configuration management processes
· Representation at agency meetings, conferences, and seminars as directed by the Government
· Responding to agency, DoD, and Intelligence Community requirements as directed by the Government
· Providing additional technical support to the other branches/clients of Mission Assurance as required

Establishing a viable and compliant Computer Network Defense is a major undertaking and requires skill and effort. This is particularly true when dealing with the Intelligence Community agencies and dealing with classified information. This requires experience professional engineers with the required security clearances in addition to CND required certifications.