July 2014 Cyber Attacks Statistics

Hackmageddon.com

It’s time to aggregate the data of the timelines of July (Part II and Part II) into (hopefully) meaning stats.

Before drilling down into the numbers, a recommendation is necessary: I will never give up repeating that these stats are necessarily an approximation since the sample is very heterogeneous, and just like all approximations they could leave some shadow zones. An example for this month is represented by the tide of cyber attacks under the umbrella of #OpSaveGaza. I am not interested to enumerate all the single attacks (also because it would be virtually impossible), so this operation appears like a single entry in the stats. Of course you have any suggestion to cope with such similar situations, they are absolutely more than welcome.

So, after this tedious, but necessary introduction, let’s rock with the data.

The Daily Trend of Attacks shows quite a fragmented trend with a…

View original post 428 more words

Global Security Solutions | IHABALI.ORG Becomes National Cyber Security Awareness Month 2014 Champion

Global Security Solutions | IHABALI.ORG Becomes National Cyber Security Awareness Month 2014 Champion.

SCADA GEN 4 & Internet Of Things

SCADA GEN 4 & Internet Of Things.

How To Design & Build A Security Operations Centre

SOC_eng

Continue reading

Ihab Ali Inform Series Big Data & Cyber Security

Big Data Big Data and Cyber Security Discussion in Pictorial Slides

The inform discussion about data explosion Continue reading

Network Security Monitoring – Lancope NetFlow for Dummies

Netflow-Security-for-Dummies-with-greyNetFlow records provide a rich source of data for security analysts to mine. Some of the most commonly used data ele- ments generated by NetFlow include: Source IP address, Destination IP address, Source port, Destination port, Protocol, Timestamps for the flow start and conclusion, Amount of data passed

Continue reading

Cyber Security Incident Response – Ponemon & Lancope Report

 

ponemon_lock-300x241

In the past 24 months, most organizations represented in this study had at least one security incident1 and expect that another incident will occur in the near future. Most respondents agreed that the best thing that their organizations could do to mitigate future breaches is to improve their incident response capabilities. This recommendation was more popular than preventative security measures such as vulnerability audits and end-user education efforts.

 

Continue reading

Incident Response Technology Update – Netflow

mysdnimage003Incident responders may use each phase of the response loop as a guide in handling urgent security situations. Responders should consider the following questions in each phase:

Observe: What is happening? What evidence exists and what is it telling us?

Orient: Is there a bigger picture? Do environmental circum- stances exist that might explain unusual observations?

Decide: In light of your observations and the environment, what action should you take next?

Act: While you’re taking action, do you observe any effects of that action on the situation? Are other changes occurring that may require analysis?

Continue reading

Network Security Series II

3CD207899BA09797C18CA1E42E394B872E237A93_largeNetwork layer

 

is responsible for the addressing and delivery of packets

Knows the address of the neighboring nodes in the network

Packages output with the correct network address information

Selects routes

Recognises and forwards to the transport layer incoming messages for local host domains

Example: Internet Protocol (IP) and Netware

  Continue reading