Information systems have become very important in every business not only that, today you can hardly find a business, organisation or even home businesses that doesn’t have a computer network of some sort. These businesses have become very dependent on these systems for their daily day-to-day operations. Thus the effectiveness of organisation’s business performance has become greatly dependant on the availability, reliability and security of these computers and the networks they’re connected to.

This has resulted to the unfortunate fact that many systems connected to the internet is a target of a range of attacks especially organisations with hundreds of hosts, services and sensitive data. It is also equally true for small offices and isolated home users with no data to protect. The reason for this is that criminals would benefit greatly from the data they steal from big organisations and in the case of small offices and home users, criminals would benefit from them by using them as a stepping stone so they can launch their attack without being caught.

From the beginning of 2003, the Internet Storm Centre (ISC) (SANS Internet Storm Centre, started to monitor the average survival time of un-patched machines and found that the time to download patches is greater than the time to install the software, which means that before a system is fully patched attacks have already spread across the network at an incredible speed. In many cases the speed of these attacks and the speed they spread across the network exceed the possibility of human intervention. Therefore the development of the components (hardware and software) that detects these attacks becomes extremely important.

This small blog aims at discussing the components that are used to keep these systems safe and discuss the areas used by attackers to attack these systems and compromise them and the data that they may hold.

The author does not claim to be an expert in the field and therefore is open for corrections and advice. So please be patient with me and feel free to share any knowledge that you may think would aid in increasing the knowledge of the blog and its community.


Infosec Tutorials

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s