Wednesday, December 30, 2009

Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts



http://livehacking.com/


Dr. Ali Jahangiri, a world-renowned information technology (IT) expert, brings us the next must-have in IT training: Live Hacking, the definitive and comprehensive guide to computer hacking. Groundbreaking, insightful, and practical, this guide serves to inform IT professionals about and challenge existing conceptions of hacking, its victims, and its consequences, but with an eye to empowering prospective victims with the knowledge they need to thwart the criminal elements in cyberspace. Whether you work in a Fortune 500 company or if you’re just looking to protect your home office from hackers, this book will provide you with all the information you need to protect your valuable information. Don’t be a victim; be ready!
Live Hacking is straightforward, easy to read, and a reference that you’ll use again and again. It’s the kind of book you’ll want to keep in your back pocket! With a user-friendly writing style and easy-to-follow diagrams and computer screenshots, Dr. Jahangiri expounds on all of the major issues—and more—in hacking:
- Basic Hacking Terminology
- Reconnaissance
- Google Hacking
- Scanning
- Enumeration
- Password Cracking
- Windows Hacking
- Malware
- Data Packet Sniffers
- Web Server and Web Application Hacking
- Denial of Service
- Wireless Network Hacking


Learn How To Hack

Learn How To Hack

 
Rest assured, Dr. Jahangiri knows all of the tools of the trade to help protect your organization’s IT assets. He brings his many years of academic, professional, and practical experience to the fore in order to equip you and your organization with the know-how needed in this day and age to defend your data against the ever-increasing cyber-thieves on the Internet. Millions of dollars are lost each year to these criminals. Dr. Jahangiri shows you in this brand new book—the most complete guide on the market—how to avoid becoming another statistic.
Dr. Jahangiri conducts thousands of hours of training per year, has patents in network security, and speaks on a variety of computer security-related issues all over the world. He even offers advice on his web site www.alijahangiri.org . His new book Live Hacking is like having your own private IT security guard. With his knowledge at your fingertips, you can fight back and stay on the offensive!

Saturday, December 26, 2009

Thursday, December 24, 2009

As attacks increase, U.S. struggles to recruit computer security experts

Washington Post Staff Writer
Wednesday, December 23, 2009


The federal government is struggling to fill a growing demand for skilled computer-security workers, from technicians to policymakers, at a time when network attacks are rising in frequency and sophistication.

Demand is so intense that it has sparked a bidding war among agencies and contractors for a small pool of special talent: skilled technicians with security clearances. Their scarcity is driving up salaries, depriving agencies of skills, and in some cases affecting project quality, industry officials said.

The crunch hits as the Pentagon is attempting to staff a new Cyber Command to fuse offensive and defensive computer-security missions and the Department of Homeland Security plans to expand its own "cyber" force by up to 1,000 people in the next three years. Even President Obama struggled to fill one critical position: Seven months after Obama pledged to name a national cyber-adviser, the White House announced Tuesday that Howard Schmidt, a former Bush administration official and Microsoft chief security officer, will lead the nation's efforts to better protect its critical computer networks.

The lack of trained defenders for these networks is leading to serious gaps in protection and significant losses of intelligence, national security experts said. The Government Accountability Office told a Senate panel in November that the number of scans, probes and attacks reported to the Department of Homeland Security's U.S. Computer Emergency Readiness Team has more than tripled, from 5,500 in 2006 to 16,840 in 2008.

"We know how we can be penetrated," said Sen. Benjamin L. Cardin (D-Md.), chairman of the Judiciary subcommittee on terrorism and homeland security. "We don't know how to prevent it effectively."

Indeed, the protection of critical computer systems and sensitive data, said former National Security Agency director William Studeman, may be the "biggest single problem" facing the national security establishment.

Agencies under attack

One evening in May 2006, a U.S. embassy employee in East Asia clicked on an innocent-looking e-mail attachment that opened the door to the most significant cyberattack the State Department has yet faced, allowing attackers operating through computers in China to send malicious computer code into the department's networks in the region.

State's cyber-emergency response team immediately went into action, working round-the-clock for two weeks to isolate the harmful code and craft a temporary patch that officials said prevented a massive data theft.

The department's response to the attack highlights how skills matter, experts said. In 2000, State had hired technicians -- the vast majority contractors -- who custom-built an intrusion detection system and trained people to identify malicious software and reverse-engineer it to determine an attack's goals and methods. As a result, department technicians in 2006 were able to contain the attack quickly, said Alan Paller of the SANS Institute, who has analyzed the case for the Center for Strategic and International Studies.

Unlike State, most government agencies and private companies lack the skills and resources to muster a robust containment effort.

Two months after the East Asia intrusion, the Commerce Department detected a similar attack -- but only after a deputy undersecretary was unable to log on to his computer. Contractor technicians were never able to identify the initial date of penetration into the computers of the Bureau of Industry and Security, which controls sensitive exports of technology that has both commercial and military uses.

It took eight days once the attack was discovered for technicians to install a filter to prevent leaks, and then they installed the wrong kind of filter, said Paller, sharing previously undisclosed findings about the incident, first reported in The Washington Post in October 2006.

Because of "operational security concerns," the Commerce Department declined to comment for this article. But a senior Commerce official told a House Homeland Security panel in 2007 that the agency had no evidence that data were compromised. Still, the department replaced hundreds of workstations and blocked employees from regular Internet use for more than a month.

Commerce is trying to improve, but it can take years to put the people, processes and technology in place to wage an effective defense, said Mischel Kwon, former director of the Department of Homeland Security's readiness team. For years, she said, most civilian agencies were forced by federal law to spend their cyber-funds on security audits as opposed to crafting a strong security program.

And most federal information technology managers do not know what advanced skills are needed to combat cyberattacks, said Karen Evans, information technology administrator in the Bush administration.

"Skills," Paller said, "are much more important than hardware."

The federal pay gap

A pillar of the federal government's effort to develop talent is the National Science Foundation's Scholarship for Service program, which pays for up to two years of college in exchange for an equal number of years of federal service. However, the program has placed fewer than 1,000 students since its inception in 2001.

The career of a 30-year-old computer scientist named Brian Denny shows how the government is often outbid by the private sector in recruiting cyber-warriors.

Denny earned a computer science masters degree in 2004 from Purdue University on an NSF scholarship. In return, he spent two years at the National Security Agency, identifying novel security flaws in computer systems and software. Then Booz Allen Hamilton, a major intelligence contractor, hired him at a 45 percent pay raise.

Today, Denny works for a small employee-owned firm that has federal government and private-sector contracts, and his pay is higher still. "You can still do a lot of cool national-security-related work as a contractor," said Denny, chief security architect for Ponte Technologies in Ellicott City, Md., near the NSA. "The pay difference is so dramatic now," he said, "you can't ignore it."

Recently, a military officer with 20 years' cybersecurity experience and a coveted security clearance sauntered out of a job interview with Northrop Grumman, a major defense contractor that is making an aggressive play for potentially billions of dollars in government cyber-business.

"It's mind-roasting," said the officer, who is about to retire. "I've had people call my house, recruiters for defense contractors . . . probably 20 calls."

The labor shortage is torquing up salaries, a cost that often gets passed on to the government. Some young people with three years' experience and a clearance are commanding salaries above $100,000. "Companies are paying people to jump from one company to another," said Ed Giorgio, a former NSA official and Ponte Technologies co-founder. The job-hopping can undermine the firm's performance on a contract, he said.

Philip Reitinger, deputy undersecretary of Homeland Security's National Protection and Programs Directorate, conceded that the government generally cannot match industry pay scales. "But in government, one can have a bigger ability to effect change at an earlier place in your career than anywhere else," he said. "And -- your country needs you."

Homeland Security officials acknowledged that hiring 1,000 people will be difficult, so they are also looking at training people already in the federal government.

Cybersecurity lawyers, researchers and policymakers are also in short supply. The Pentagon, for instance, lacks a career path to develop "expert decision-making in the cyber field," said Robert D. Gourley, a former Defense Intelligence Agency chief technology officer. "The great cyber-generals are few and far between."

Tuesday, December 22, 2009

Information Security Forum




https://www.securityforum.org/



Founded in 1989, the Information Security Forum (ISF) is an independent, not-for-profit organisation that supplies authoritative opinion and guidance on all aspects of information security. By harnessing our world-renowned expertise and the collective knowledge and experience of our 300 members, the ISF delivers practical solutions to overcome wide-ranging security challenges impacting business information today.


Four main areas of service are available to our Members:


Tools and Methodologies, built using the collective expertise, insight, and knowledge of our Members worldwide
A comprehensive programme of Knowledge and Information Exchange, offering interactive peer-to-peer forums that give Members an opportunity to meet on a regular basis to share best practices, experiences and perspectives on a wide range of issues.



An impressive library of Research and Report material, incorporating an unmatched degree of thought leadership in information security, information risk management and related topics.
The ISF Annual World Congress, our flagship global event which offers attendees an opportunity to discuss key security challenges and gain practical advice from peers and leading industry experts from around the world.

Wednesday, December 16, 2009

A comprehensive national broadband plan.

FCC digs into broadband controversies


by Marguerite Reardon

The Federal Communications Commission is taking on difficult and controversial issues as it works toward developing a comprehensive national broadband plan.

On Wednesday the agency heard from an FCC task force on the progress that it's making in writing that broadband plan, which will be presented to Congress in February.

The FCC has been tasked with developing a plan that will get broadband services to all Americans. In working to come up with a comprehensive policy, the FCC has tackled several controversial issues, most notably reforming the Universal Service Fund, reallocating wireless spectrum, and forcing more competition in the market for cable set-top boxes.

One of the top items on the FCC task force's to-do list is reforming the $7 billion rural phone subsidy program called the Universal Service Fund. This program, which also provides funding for schools and libraries through its E-rate program, is funded by consumers, who are charged extra fees on their long-distance phone bills. Specifically, the agency wants to expand the program to help fund broadband service in parts of the country where private industry doesn't find it profitable to invest.

The task force didn't provide long-term recommendations for transitioning USF into funding broadband deployments. But in the short term, it suggested extending some current programs such as life-line link-up to schools and other public areas to provide more access to unemployed people who may not have Internet connectivity at home. The idea is that these individuals can use broadband in these public areas to look for jobs.

FCC Chairman Julius Genachowski said it will take time to get reforms in place. He noted that the national broadband plan won't directly affect USF, but he said the program, once it's expanded, will eventually help fund and become a key part of helping get broadband to underserved parts of the country.

"It's tempting to kick the can [USF reform} further down the road," he said. "But for many reasons it's important to begin tackling these issues now. We must make sure that the fund fully supports the technology of today and tomorrow, not just the technology of the past."

But the process is going to be a long one, he said. And he wouldn't comment on whether true reform could be achieved in his term as chairman.

The FCC task force also reiterated its plans to re-evaluate spectrum issues. Genachowski has said publicly that one of his top priorities is reallocating and finding more spectrum that can be used to build wireless broadband services. Both he and the CTIA, a trade group representing the wireless industry, say there is a looming spectrum crisis that could result in dire consequences without adequate attention now.

During its report to the commission, the broadband task force said it is working with Congress to inventory and assess current spectrum usage in the U.S. It is calling for Congress to also require periodic review of spectrum uses and to find ways to clear spectrum bands that aren't serving other uses, such as wireless broadband.

The task force also said during its presentation Wednesday that it's looking at ways to spur more competition in the cable set-top box market. The group said that a lack of competition in the set-top box market has also resulted in a lack of innovation. The agency feels that more competition in this market would spur companies to develop new Internet applications and services that could be accessed via TVs.

The FCC is considering requiring paid TV providers, such as Comcast, Time Warner Cable, AT&T, and Verizon Communications to supply a low-cost network interface device that would allow people to access the Internet on their TVs and to access cable TV without using a cable box.