Posts

Showing posts from October, 2017

Electronic Health Record (EHR) Access Control Case Study

    Case Discussion Questions a.      List three benefits and three risks for using Smart Cards and PKI.             PKI            Smart Card Benefits ·         PKI provides secure transactions It makes sure that the exchange of confidential data is done via secure extranets and virtual private networks (VPN). When using VPN, there is easy access to business-critical data that is stored in internal networks. ·         PKI provides authentication It can provides guarantee about the user. It can check the identity about the users and can check this come from legitimate user or not. ·          More secure than passwords  A malicious user must obtain both the private key and the corresponding passphrase to pose as a legitimate user. ·         More Secure Smart cards are use encryption methods to secure the this. The heart of smart card is microprocessor. It can contact wi

Hackers...

Image
The Hacker..... Hacker is the common term used to describe a network attacker. There are three type of hackers. Some of them are not harmful and some of them are very harmful. However  the "hacker" term has verity of meninges and there are 3 type of hackers. White hat hacker, gray hat hacker, black hat hacker. A clever programmer capable of developing new programs and coding changes to existing programs to make them more efficient. A network professional that uses sophisticated programming skills to ensure that networks are not vulnerable to attack. A person who tries to gain unauthorized access to devices on the Internet. Individuals who run programs to prevent or slow network access to a large number of users, or corrupt or wipe out data on servers.

About Heartland Payment System Cyber Attack

Image
About Heartland Payment System Cyber Attack On August 13, 2009, the Payment Cards Center hosted a workshop examining the changing nature of data security in consumer electronic payments. The center invited the chairman and CEO of Heartland Payment Systems, Robert Carr, to lead this discussion & to share his experiences stemming from the data breach at his company in late 2008 and, as important, to discuss lessons learned as a result of this event. Carr acknowledged that Heartland is working within the confines of the merchant acquiring and processing environment to address data security  through improved information sharing & security of  intransigent . The data breach at heartland is very costly for the company.It lost 50 percent of its market capitalization 2009.  It had more than $32 legal fees, forensic costs, reserves for potential card brand fines, and other related settlement costs. 1)  Vulnerability    :    poorly coded Web application software to

Find solution for Bandit war-game as a beginner level 0 - level 11

Image
This blogpost contains the solutions of how I solved the challenges of the OverTheWire Bandit category. The purpose of this wargame is to solve the current level’s problem to find the password for the next level. I had used the basic shell commands in this.   cd, cat, file, du, find, grep, sort, uniq, strings, base64, tr, tar, gzip, bzip2, xxd like that. level 0 :  Using putty give level 0 password as bandit0 and using hint found the level 1 password bandit0 ->ls -> cat readme -> exit level1 pw is : boJ9jbbUNNfktd78OOpsqOltutMc3MY1 level 1: Using level 1 password loging to level 1 Using hints found level 2 password bandit 1 -> ls -> cat ./-  -> exit level2 pw is :CV1DtqXWVFXTvM2F0k09SHz0YwRINYA9 level 2: Login to level 2 and go through the given hints. Using hint can found a file ,the file call  spaces in this filename. In that file ther

Research Literature Paper About Ransom-ware Attack

Image
                                                     

Sample Risk Analysis Report Using Octave Allegro Framework...

Image