Archive for April, 2010

Cloud computing Security

Posted in IT Security on April 19, 2010 by cobra

Cloud computing represents a huge change in the way a business functions, and that’s especially true for an organization’s IT infrastructure. Nobody is affected more by this transition than the network administrators tasked with keeping an organization’s data and network users safe.

Sharing data, applications and IT infrastructures can present significant cost and productivity benefits, but it all takes place outside of the comfort zone of the corporate firewall and physical environment. As a network administrator, your task during a cloud computing implementation is to ensure users and data remain secure after transitioning data, applications, an infrastructure, or all of the above to the cloud. Although there is a shared responsibility with the cloud provider for the security of enterprise data, ultimately enterprise security pros are responsible.

Please click here to read the documentation on (Security Guidance for Critical Areas of Focus in cloud computing) prepared by Cloud Security Alliance.

Security through Virtualisation

Posted in IT Security on April 19, 2010 by cobra

A separate virtual system for every task — that’s the basic formula of Qubes‘ security concept. Qubes, a new operating system presented by Joanna Rutkowska, plans to limit any damage malicious software might do; so even if the game just tested turns out to be a trojan or an attacker is exploiting a WiFi driver bug, our online banking credentials are not at risk. They are safely stored in the banking VM, which runs nothing but online banking.

The researcher’s approach relies on isolating individual tasks in light-weight virtual machines (VMs) running on one physical PC. Its technical foundations are provided by existing open source projects such as Xen, Linux and the X Window System, on top of which Joanna Rutkowska and her colleague Rafal Wojtczuk have designed and implemented components such as a secure graphical user interface. The GUI is able, for example, to safely allow for copying and pasting between VMs.

Please click here to read the complete documentation on (Qubes OS Architecture).
😀

Windows 7 Security Basics

Posted in IT Security on April 2, 2010 by cobra

Windows 7 is Microsoft’s latest desktop-based client operating system which builds on the strengths and weaknesses of its predecessors, Windows XP and Windows Vista. Every aspect of the base operating system as well as the services it runs and how it manages the applications loaded within it has been reviewed and made more secure if possible. All services have been enhanced and new security options making it more reliable. Aside from basic system enhancements and new services, Windows 7 delivers more security functionality, enhanced auditing and monitoring capabilities and the ability to encrypt remote connections and your data, Windows 7 also has newly developed internal protection enhancements to secure system internals such as Kernel Patch Protection, Service Hardening, Data Execution Prevention, Address Space Layout Randomization, and Mandatory Integrity Levels.

Click here to learn the fundamentals to secure Windows 7 correctly, achieve a baseline level of security, review advanced security configurations and explore some of the lesser known security functionality Windows 7 provides in order to prevent or protect against a possible attack.