security.blogoverflow.comStack Exchange Security Blog

security.blogoverflow.com Profile

Security.blogoverflow.com is a subdomain of Blogoverflow.com, which was created on 2010-10-12,making it 14 years ago. It has several subdomains, such as english.blogoverflow.com math.blogoverflow.com , among others.

Discover security.blogoverflow.com website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site

security.blogoverflow.com Information

HomePage size: 78.809 KB
Page Load Time: 0.870674 Seconds
Website IP Address: 198.252.206.19

security.blogoverflow.com Similar Website

Stack Exchange Bicycles Blog
bicycles.blogoverflow.com
Anime & Manga Stack Exchange
anime.stackexchange.com
BACnet stack - open source BACnet protocol stack
bacnet.sourceforge.net

security.blogoverflow.com PopUrls

Stack Exchange Security Blog
http://security.blogoverflow.com/
QotW #9: What are Rainbow Tables and how are they used?
https://security.blogoverflow.com/2011/09/qotw-9-what-are-rainbow-tables-and-how-are-they-used/
Confidentiality, Integrity, Availability: The three components of the ...
https://security.blogoverflow.com/2012/08/confidentiality-integrity-availability-the-three-components-of-the-cia-triad/
QoTW #51 Would it be good secure programming practice to overwrite a ...
https://security.blogoverflow.com/2014/12/qotw-51-would-it-be-good-secure-programming-practice-to-overwrite-a-sensitive-variable-before-deleting-it/
About Secure Password Hashing « Stack Exchange Security Blog
https://security.blogoverflow.com/2013/09/about-secure-password-hashing/
Why passwords should be hashed « Stack Exchange Security Blog
https://security.blogoverflow.com/2011/11/why-passwords-should-be-hashed/
QoTW #47: Lessons learned and misconceptions regarding encryption and ...
https://security.blogoverflow.com/2013/06/qotw-47-lessons-learned-and-misconceptions-regarding-encryption-and-cryptology/
A Brief Introduction to auditd « Stack Exchange Security Blog
https://security.blogoverflow.com/2013/01/a-brief-introduction-to-auditd/
Is our entire password strategy flawed? « Stack Exchange Security Blog
https://security.blogoverflow.com/2014/06/should-we-rethink-our-entire-password-strategy/
About « Stack Exchange Security Blog
https://security.blogoverflow.com/about/

security.blogoverflow.com Httpheader

content-type: text/html
last-modified: Wed, 01 Mar 2017 20:25:58 GMT
accept-ranges: bytes
x-powered-by: ASP.NET
date: Tue, 14 May 2024 15:32:44 GMT
content-length: 66899

security.blogoverflow.com Ip Information

Ip Country: United States
Latitude: 37.751
Longitude: -97.822

security.blogoverflow.com Html To Plain Text

current community chat IT Security IT Security Meta more communities Explore other Stack Exchange communities on stackexchange.com Stack Exchange This page is an archive of this blog, and is presented for historical purposes only. QoTW #53 How can I punish a hacker? 2016-02-05 by roryalsop . 4 comments Elmo asked: I am a small business owner. My website was recently hacked, although no damage was done; non-sensitive data was stolen and some backdoor shells were uploaded. Since then, I have deleted the shells, fixed the vulnerability and blocked the IP address of the hacker.Can I do something to punish the hacker since I have the IP address? Like can I get them in jail or something? This question comes up time and time again, as people do get upset and angry when their online presence has been attacked, and we have some very simple guidance which will almost always apply: Terry Chia wrote: You don’t punish the hacker. The law does . Just report whatever pieces of information you have to the police and let them handle it. And @TildalWave asked What makes you believe that this IP is indeed a hacker’s IP address, and not simply another hacked into computer running in zombie mode? And who is to say, that your own web server didn’t run in exactly the same zombie mode until you removed the shells installed through, as you say, later identified backdoor? Should you expect another person, whose web server was attempted to be, or indeed was hacked through your compromised web server’s IP, thinking exactly the same about you, and is already looking for ways to get even like you are? justausr takes this even further: Don’t play their game, you’ll lose I’ve learned not to play that game, hackers by nature have more spare time than you and will ultimately win. Even if you get him back, your website will be unavailable to your customers for a solid week afterwards. Remember, you’re the one with public facing servers, you have an IP of a random server that he probably used once. He’s the one with a bunch of scripts and likely more knowledge than you will get in your quest for revenge. Odds aren’t in your favor and the cost to your business is probably too high to risk losing. Similarly, the other answers mostly discuss the difficulty in identifying the correct perpetrator, and the risks of trying to do something to them. But Scott Pack ‘s answer does provide a little side-step from the generally accepted principles most civilians must follow: The term most often used to describe what you’re talking about is Hacking Back. It’s part of the Offensive Countermeasures movement that’s gaining traction lately. Some really smart people are putting their heart and soul into figuring out how we, as an industry, should be doing this. There are lots of things you can do, but unless you’re a nation-state, or have orders and a contract from a nation-state your options are severely limited . tl;dr – don’t be a vigilante. If you do, you will have broken the law, and the police are likely to be able to prove your guilt a lot more easily than that of the unknown hacker. Like this question of the week? Interested in reading more detail, and other answers? See the question in full. Have questions of a security nature of your own? Security expert and want to help others? Come and join us at security.stackexchange.com . Filed under Attack , ethics , Question of the Week Tagged: attack , QOTW Business Continuity is concerned with information security risks and impacts 2015-08-02 by lucaskauffman . 0 comments A Business Continuity Programme (BCP) is primarily concerned with those business functions and operations that are critically important to achieve the organization’s operational objectives. It seeks to reduce the impact of a disaster condition before the condition occurs. Buy-in from top level management is required as a review is required of each function defined in the business as to ensure all key-personnel is identified. Why would a business require a BCP? The BCP ensures the business can continue in case of (un)foreseen circumstances. To motivate top-level management to support the BCP, the best way is to set up a risk/reward overview and use examples to show what can happen when you do not have a BCP in place. The most important question to ask is: If we (partially) shut down the business for x amount of time, how much money would this cost, both short (direct business loss) and long term (indirect business loss from reputational damages)?”. Losing critical systems, processes or data because of an interruption in the business could send an organization into a financial tailspin. The main concern of a BCP is to ensure availability of the business is maintained. Confidentiality and integrity should also be addressed within the Business Continuity Plan. In terms of availability the risk to business continuity is often explained as a service interruption on a critical system, e.g. a payment gateway of a bank goes down, preventing transactions from occurring. The short- and long-term impact are financial losses due to the bank not being able to process transactions, but also clients becoming more and more dissatisfied. Confidentiality in BCP could for example be the transfer of personal data during a disaster recovery. An objective of disaster recovery is to minimize risk to the organization during recovery. There should be a baseline set of documented access controls to use during recovery activities. They are necessary to prevent intrusions and data breaches during the recovery. The impact here can be one of reputation but also of financial nature. If a competing company can for example obtain a set of investment strategies, it could assist the competing company to invest against them, resulting in significant financial losses and even bankruptcy. Integrity of information means that it is accurate and reliable and has not been tampered with by an unauthorized party. For example it is important that the integrity of each customer’s data, but also information originating from third parties, can be ensured. An example of the impact of integrity violation: when a bank cannot rely on the integrity of data, for instance if it authorizes transactions to a nation or person on a sanctions list (originating from a third party), they could be heavily fined, but also might lose their banking license. A BCP goes wider than just impacts, it also addresses risks. A business impact analysis is performed to understand which business processes are important. These critical” business processes are provided with special protection in the framework of business continuity management, and precautions are taken in case of a crisis. Critical” in the sense of business continuity management means time-critical”, which means that this process must be restored to operation faster because otherwise a high amount of damage to the organisation can be expected. While the BIA answers the question of what effects the failure of a process will have on the organisation, it is necessary to know what the possible causes of the failure could be. Risks at process level as well as risks resource level need to be examined. A risk at the process level could be the failure of one or more (critical) resources, for example. A risk analysis at the resource level only looks for the possible causes of the failure of these critical resources. BCP relies on both impact and risk assessments, but making a risk assessment without an impact assessment is difficult. ISO 22301 requires a risk assessment process to be present. The goal of this requirement is to establish, implement, and maintain a formal documented risk assessment process that systematically identifies, analyses, and evaluates the risk of disruptive incidents to the organization. I want to conclude with stating that risk analysis and business impact analysis (BIA) are cornerstones in understanding the threats, vulnerabilities and mission-critical functions of the...

security.blogoverflow.com Whois

Domain Name: BLOGOVERFLOW.COM Registry Domain ID: 1620079916_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.corporatedomains.com Registrar URL: http://cscdbs.com Updated Date: 2024-01-29T06:34:55Z Creation Date: 2010-10-12T19:55:38Z Registry Expiry Date: 2025-02-02T11:59:59Z Registrar: CSC Corporate Domains, Inc. Registrar IANA ID: 299 Registrar Abuse Contact Email: domainabuse@cscglobal.com Registrar Abuse Contact Phone: 8887802723 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Name Server: NS-1870.AWSDNS-41.CO.UK Name Server: NS-4.AWSDNS-00.COM Name Server: NS-CLOUD-C1.GOOGLEDOMAINS.COM Name Server: NS-CLOUD-C2.GOOGLEDOMAINS.COM DNSSEC: unsigned >>> Last update of whois database: 2024-05-17T13:13:25Z <<<