<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/plusone.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d5879416\x26blogName\x3dThe+J+Spotter\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttp://jangelo.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://jangelo.blogspot.com/\x26vt\x3d-4550191991343502374', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

The J Spotter

Personal insights from the J Spot author J. Angelo Racoma
( this site has moved to http://jangelo.racoma.net )

The J Spotter » ISAW: Why are malicious hackers succeeding?

ISAW: Why are malicious hackers succeeding?

A 6 December post on the Internet Security and Warfare (ISAW) weblog.

Why are malicious hackers succeeding?
ISAW (Internet Security And Warfare):

...
Malicious hackers are always one step ahead of everyone else. Most of the time sysads will only know that their system has been compromised when their website is defaced or when they detect that their system is acting weird. By then, it’s already too late because it means that somebody has already been inside the system.
...
Recommendations:

(1) Absolute security can never be achieved. Instead of using anti-anything alone (spam, virus, hacker, spyware, etc.), it is also important to properly educate system users. These two things, when coupled together, will result in a more secure network.

(2) Network security should be proactive; do not wait for security breaches to happen before doing something to secure your network.

(3) Develop sound security policy and force users to follow it. A policy is an outline of security practices that every employee in a company should follow.

(4) Subscribe to security mailing lists to be updated on what is going on. Patch and update your system regularly to avoid breaches.

(5) READ, READ, READ.

(posted by PI Flashbulb)


Sensible Recommendations, IMHO. Anyone interested in securing their systems should act proactively. After all, hackers with malicious intent (i.e. crackers) are usually one step ahead of everyone else in terms of security (and breaches, thereof).

- Angelo
| Previous item: Slashdot: Firefox Users Bad For Advertisers »
| Previous item: Population Management - Are we up to it? »
| Previous item: Tandang Sora Flyover to be closed? »
| Previous item: Yahoo! News - Exploding Cell Phones a Growing Prob... »
| Previous item: Politics and Long-Term Development »
| Previous item: Gizmodo : Retro Phones at Retrofone »
| Previous item: BusinessWeek: Filipinos Are Getting The Message »
| Previous item: The Email Hoax of the year? A compilation of my bl... »
| Previous item: CRAZED: The Foolish and the Weak »

» Post a Comment