Home / Segmented / IT Systems and networks administration

IT Systems and networks administration

This section provides content of interest to IT professionals involved in managing systems, services, applications, network equipment, technical and user support, access controls and SOC or IT incident response specialists.

Candado amarillo

The importance of system hardening

Posted on 05/18/2015, by Lorenzo Martínez Rodríguez
Complaining is part of human nature. When it rains, why is it raining? When it is hot, why is it hot? When Real Madrid wins, why does Barcelona not lose, and vice-versa? The issue is that we complain. However, we do not always think what we can do to change or improve the causes of our complaints. Of course, not everything is under our control or in our hands, but we can do a lot, beginning...
Emerging Evasion Techniques

Emerging Evasion Techniques: Domain Shadowing

Posted on 04/08/2015, by Antonio López (INCIBE)
The malware in general and in particular botnets maintain a constant battle to operate through internet and avoid detection. Techniques like blacklisting domains and sinkholing are bypassed with various countermeasures. Let's talk about domain, a recent mechanism of evasion.
Study of the security in cloud storage services

Study of the security in cloud storage services: Analysis of Dropbox and Mega

Posted on 01/27/2015, by Jesús Díaz (INCIBE)
Cloud storage services are receiving increasing popularity. But, how to choose among al the available alternatives? In this study, the main factors affecting security are described, creating a common framework for their analysis. Subsequently, these principles are applied for analyzing two of the main current solutions: Dropbox and Mega.
SELinux

SELinux and Mandatory Access Control

Posted on 12/29/2014, by Antonio López (INCIBE)
In a previous article about basic access control mechanisms in systems security we introduced Mandatory Access Control (MAC) as a more accurate mechamism than basic access control. Now we are talking about of SELinux as an example of Mandatory Access Control.
Not on my shift...

Contactless payment? Not on my shift...

Posted on 12/18/2014, by Miguel Herrero (INCIBE)
Mobile Pwn2Own 2014, an event focused on discovering vulnerabilities targeting last generation mobiles, compromised five top quality smartphones. Different techniques were used to compromise these, being NFC the technology used to vulnerate Samsung Galaxy 5 and LG Nexus 5 and getting control of the mobile. It is not the first time NFC stars in security news. Not too long ago we could see how a...

Pages