geraintw.blogspot.com
GeraintW Online Blog: May 2015
http://geraintw.blogspot.com/2015_05_01_archive.html
Information security professional blog. Sunday, 31 May 2015. PCI DSS and SSL/TLS certificates. This article is aimed at those implementing the PCI DSS v3.1 requirements and those conducting audits to ensure an organisation is compliant. It aims to provide some background around the issues, how encryption is incorporated with the standard and how it can be audited. Versions of SSL and TLS. IETF Standard (RFC 2246). IETF Standard (RFC 4346). IETF Standard (RFC 5246). PCI DSS v3.1 requirement. Implement add...
geraintw.blogspot.com
GeraintW Online Blog: April 2014
http://geraintw.blogspot.com/2014_04_01_archive.html
Information security professional blog. Sunday, 27 April 2014. As part of the events related to InfoSec, I am looking forward to the ISSA-UK Infosec drinks on the Tuesday and the Information Security Bloggers meet-up on Wednesday evening where IT Governance Blog. To which I contribute has been nominated for Corporate Blog of the year. I will also be attending two other PCI events in London during the week, including the “PCI SSC Assessor session London 2014” on Friday 2nd May. Final on the 13. I decided ...
geraintw.blogspot.com
GeraintW Online Blog: Router Analysis
http://geraintw.blogspot.com/p/router-analysis.html
Information security professional blog. An analysis of the log files from my ADSL router, the router records DOS and Port Scans, with the originating IP address. In order to analysis the results I looked at the total number of attacks, looked at whether there were DOS or Port Scan. For the recorded IP addresses I identified the number of unique IP and then lookup the country of issuing the IP address registration. No of attack from country. No of attack from country. No of attack from country. 10 of the ...
geraintw.blogspot.com
GeraintW Online Blog: February 2015
http://geraintw.blogspot.com/2015_02_01_archive.html
Information security professional blog. Saturday, 28 February 2015. Some of the security threats faced by businesses are shown on diagram below that I drew a number of years ago. Although still relevant I'm aiming to update it. How many do you face on a daily basis,. Thursday, 26 February 2015. The protocol is based on a socket which is the address of a service and consist of the internet protocol address, the port number and protocol being used. Hence the following are two distinct sockets. To create an...
geraintw.blogspot.com
GeraintW Online Blog: Talks & Presentations
http://geraintw.blogspot.com/p/talks-presentations.html
Information security professional blog. The following is list of presentations that I give as part of meeting the CPD requirements of various certify organisations. These presentations are aimed at a non infosec audience and are suitable for the non technical as well. They are not overly technical and I try include practical demonstrations of the points where possible. If you would like to discuss about me giving a talk to a group you organise, please contact me. Title: Demystifying Phone Hacking. The su...
geraintw.blogspot.com
GeraintW Online Blog: Root Servers
http://geraintw.blogspot.com/2015/05/root-servers.html
Information security professional blog. Sunday, 10 May 2015. When discussing networking and how the internet works as part of some of the courses I deliver the topic of DNS comes up as a security risk. A question asked is whether the root servers could be taken offline by a DDoS attack. There have been attempts at doing this and the two most notables ones are:-. October 21, 2002. February 6, 2007. A DDoS attack may of been possible in the early days of the internet however the resilience and security tha...
geraintw.blogspot.com
GeraintW Online Blog: Security Threats
http://geraintw.blogspot.com/2015/02/security-threats.html
Information security professional blog. Saturday, 28 February 2015. Some of the security threats faced by businesses are shown on diagram below that I drew a number of years ago. Although still relevant I'm aiming to update it. How many do you face on a daily basis,. Subscribe to: Post Comments (Atom). Head of Technical Services at IT Governance Ltd. Managing the Penetration Testing, PCI and Cyber Essentials consultancy services. View my complete profile. Wednesday Oct 7th, 2015. Thursday May 14th, 2015.
geraintw.blogspot.com
GeraintW Online Blog: What is SSL
http://geraintw.blogspot.com/2015/02/what-is-ssl.html
Information security professional blog. Thursday, 26 February 2015. SSL has been in the news over the last year for having a number of high profile vulnerabilities, but outside of the world of the encryption specialist the understanding of what it does is limited. This is fine as security tools such as SSL and TLS are suppose to be transparent to the end user. Hence the following are two distinct sockets. Secure HTTP typically uses socket TCP 443, whilst plaintext HTTP will use socket TCP 80. Creation of...
geraintw.blogspot.com
GeraintW Online Blog: March 2014
http://geraintw.blogspot.com/2014_03_01_archive.html
Information security professional blog. Tuesday, 25 March 2014. What would ‘Q’ make of Drones? This led to the question “What would ‘Q’ make of Drones? 8221; In literature and film ‘Q’ is the head of the fictional research and development division of the British Secret Service. He produces all manners of gadgets that resemble everyday objects but have sinister uses to help James Bond protect Britain and live another day. SkyJack developed by by Samy Kamkar is a drone engineered to autonomously seek out, ...
geraintw.blogspot.com
GeraintW Online Blog: Forthcoming talk
http://geraintw.blogspot.com/2015/03/forthcoming-talk.html
Information security professional blog. Thursday, 12 March 2015. Hacking the Internet of Things (IoT). Thursday 14 May 2015. 800pm at the offices of Sopra Steria, Hemel Hempstead, HP2 7AH. It includes a demonstration of RFID can be compromised by looking at an attack on a RFID based door access controller. The event is being organised by the Hertfordshire branch of the BCS, details of the talk are on their event page. Subscribe to: Post Comments (Atom). View my complete profile. Wednesday Oct 7th, 2015.