Archive

Posts Tagged ‘Cyber Security’

The European Network and Information Security Agency (ENISA) recommends that honeypots be used to detect threats at an early stage

The European Network and Information Security Agency (ENISA) recommends that honeypots be used to detect threats at an early stage; the agency tested 30 current systems and came up with concrete recommendations.

Honeypots are digital traps used to analyse cyber attacks and their strategies and tools. In the study, ENISA tested honeypots for effectiveness and practicality, with a focus on open-source honeypots. The results are intended to help companies find the best digital traps for their particular situations and to promote further development in the area.

The evaluation system developed for the ENISA study places particular emphasis on user-friendliness. ENISA employees used the honeypot evaluation procedurePDF developed in 2006 by Christian Seifert, Ian Welch and Peter Komisarczuk as a basis for the system and added more “practical” categories. They also differentiated more between various types of honeypots; types tested include server-side honeypots, client-side honeypots, low-interaction honeypots, high-interaction honeypots, hybrid honeypots and sandboxes. Open source online honeypots for monitoring suspicious URLs were also evaluated.

As part of the study findings, ENISA recommends a number of digital traps, noting that dionaea, Glastopf, kippo and Honeyd are particularly easy to use. Among the client honeypots, Thug and Capture-HPC NG also received special mentions.

Read more here: http://www.h-online.com/open/news/item/ENISA-promotes-digital-hacker-traps-1759415.html

Cyber Security: The Road Ahead

The open Internet has been a boon for humanity. It has not only allowed scientists, companies and entities of all sorts to become more effective and efficient. It has also enabled an unprecedented exchange of ideas, information, and culture amongst previously unconnected individuals and groups. It has completely revolutionized on a global scale how we do business, interact and communicate.

Cyberspace is defined by its ubiquitous connectivity. However, that same connectivity opens cyberspace to the greatest risks. As networks increase in size, reach, and function, their growth equally empowers law-abiding citizens and hostile actors. An adversary need only attack the weakest link in a network to gain a foothold and an advantage against the whole. Seemingly localized disruptions can cascade and magnify rapidly, threaten other entities and create systemic risk.

However, vulnerabilities in cyberspace are real, significant and growing rapidly. Critical national infrastructure; intelligence; communications, command and control; commerce and financial transactions; logistics; consequence management; and emergency preparedness are wholly dependent on networked IT systems. Cyber security breaches, data and intellectual property theft know no limits. They affect everything from personal information to national secrets.

Download the paper that looks at the way these problems are likely to develop, as well as at some of the ways they may best be tackled at the national and international level.