Home / Blog / Filter / Blog
Subscribe to INCIBE-CERT - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Best practices
SELinux

SELinux and Mandatory Access Control

Posted on 12/29/2014, by Antonio López (INCIBE)
In a previous article about basic access control mechanisms in systems security we introduced Mandatory Access Control (MAC) as a more accurate mechamism than basic access control. Now we are talking about of SELinux as an example of Mandatory Access Control.
Access denied

Basic Access control mechanisms in Systems Security

Posted on 11/27/2014, by Antonio López (INCIBE)
<p>In any IT system, especially if it’s multiuser, the access control of users and resources is fundamental for its security. That’s why it’s very important to have mechanisms that provide an appropriate segregation of privileges and user permissions, along with the administration of these and related elements.</p>
Abuse of DNS

Use and Abuse of DNS

Posted on 10/02/2014, by Antonio López (INCIBE)
DNS is a protocol present in almost all network communications and therefore very attractive as a tool of attack and / or distribute malicious software such as viruses, botnets and malware. In this article some both offensive and defensive strategies based on the use of DNS are briefly outlined.
Fingerprint

The issue of biometrics as an authentication method

Posted on 09/25/2013, by Antonio Rodríguez (INCIBE)
With the announcement of the new fingerprint sensor in the latest smartphone from Apple, the iPhone 5S, biometric sensors are again under scrutiny among information security professionals. Especially because the use of these technologies is becoming popular for consumer grade electronics, and its use use could become ubiquitous for something made to protect sensitive data, like information...

Pages