Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Jan 2012

    A Note on Security Protocol for Multicast Communications

    The authors show that the protocol recently proposed in for securing multicast communication is completely insecure. They described obvious insecurity of the multicast protocol. The proposal lacks any decent security analysis. Moreover, the protocol cannot be easily fixed, since not distributing the inverses of secrets assigned to other members of...

    Provided By Comenius University

  • White Papers // Mar 2012

    Attacking Scrambled Burrows-Wheeler Transform

    Scrambled Burrows-Wheeler transform is an attempt to combine privacy (encryption) and data compression. The authors show that the proposed approach is insecure. They present chosen plaintext and known plaintext attacks and estimate their complexity in various scenarios. The Burrows-Wheeler Transform (BWT) is a commonly used transform in loss-less compression algorithms....

    Provided By Comenius University

  • White Papers // Sep 2008

    ESET Smart Security Business Edition Comparative Testing

    ESET commissioned West Coast Labs to carry out a series of independent performance evaluations and comparative tests on the ESET Smart Security Business Edition package when compared with other leading vendors. ESET's Smart Security Business Edition product, are drawn from the leading vendors in the field of IT security such...

    Provided By West Coast Labs

  • Case Studies // Jan 2009

    Guard Data and Improve Performance With Internet Security Approach

    The New York Eye and Ear Infirmary, ranked one of the Nation's top hospitals by the U.S. News and World Report, is a not-for-profit organization located in New York City whose mission is "To provide all in need with the highest quality care in the disciplines of Ophthalmology, Otolaryngology/Head &...

    Provided By Cymphonix

  • White Papers // Jun 2009

    Network Box Intrusion Detection & Prevention System

    Wikipedia defines Intrusion Detection as "The act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource", and then goes on to say that "When Intrusion Detection takes a preventive measure without direct human intervention, then it becomes an Intrusion Prevention System". Network Box includes...

    Provided By Network Box

  • White Papers // Sep 2009

    Network Box Advisory: Forgotten Security

    Some businesses rely on IT departments to spot the weak points in the system and rectify them as soon as possible. Whilst the need for a rapid resolution is understandable, this method exposes the company to vulnerability - human error. A procedure should be in place, so that if and...

    Provided By Network Box

  • White Papers // Sep 2009

    Network Box White Paper: Securing Schools From Social Media Threats

    Schools today face increasing internet security risks from the number of new platforms and technologies used by pupils and teachers in and out of the classroom. The proliferation of social networks such as Facebook, Bebo and MySpace, instant messenger (IM) platforms, and file-sharing and peer-to-peer applications and software mean that...

    Provided By Network Box

  • White Papers // Sep 2009

    Authentication - Who Are You?

    Identity fraud is rising. It is increasingly simple, with more ways of doing it than ever before. As more and more applications become available to over the Internet, there is a growing need to prove identity, in order to prevent criminals from taking advantage of all. To achieve this protection...

    Provided By Network Box

  • White Papers // Jul 2008

    SPAM Back-Scatter

    The core of the back-scatter problem is that it is trivial to forge the sender address of an email; as the standard email protocols provide no mechanisms to authenticate the sender's email address. Spammers don't want to deal with backscatter, and they don't want complaints coming back; so they forge...

    Provided By Network Box

  • White Papers // Sep 2009

    How That PDA Could Bring the Whole System Crashing Down

    As users blur work and personal Internet use, particularly on their own devices, one could find organization exposed to malware simply because of their ignorance. The battle for corporate network security is being fought at new endpoints. Businesses need to think laterally when it comes to protecting their networks from...

    Provided By Network Box

  • White Papers // Apr 2008

    How to Choose the Right Security Personnel

    The continual success of the network security industry owes much to the ever-advancing, cutting-edge technology. However, this is only as effective as the security professionals that run it. This means recruiting high-calibre security professionals is essential for any organisation wishing to be protected from the external and internal threats. The...

    Provided By Network Box

  • White Papers // Mar 2008

    Parasitic Malware

    It should also be noted that the term 'Parasitic Malware' can refer to malware that exploit vulnerabilities in other malware to install themselves. For the purposes of this paper, however, the term refers to malware that adds itself to legitimate files in one way or another. It is always useful...

    Provided By Network Box

  • White Papers // Mar 2008

    Phishing With Good Bait

    Phishing is fraudulently attempting to acquire sensitive information like passwords, credit card details etc. It's tied into the growing crime of identity theft and, over the past two years, there has been a big increase in this form of crime. So what can a company do to protect itself from...

    Provided By Network Box

  • White Papers // Sep 2009

    Part II: Routing, the Hole in the Wall

    Routing can be tricky. If one knows where data is going, one is half way to resolving a large number of application problems. But understanding where data is being routed to and from is crucial in the security arena. Incorrect routing can result in security measures being bypassed or reduced...

    Provided By Network Box

  • White Papers // Sep 2009

    Network Box Advisory: Forgotten Security - Part 1: Monitoring

    Companies are protecting themselves from high-profile threats such as malware attacks, but are often leaving themselves vulnerable from the 'forgotten security defences'. The first of these results from simply not monitoring the applications, hardware and security systems across the business, which can lead to network failure. Most businesses are using...

    Provided By Network Box

  • White Papers // Mar 2008

    Gang Culture in the Online World

    Off late when online scams such as phishing were relatively new phenomena, an email containing grammatically incorrect English may have been enough to dupe a recipient. Similarly, a phishing website may not have been an exact replica of a bank's, but it was familiar enough to fool a significant number...

    Provided By Network Box

  • White Papers // Sep 2009

    Online Privacy and Browser Security

    In the past year there have been a number of debates on the need for online privacy. Some commentators (Sir David Omand and Scott McNealy) have argued that privacy online must be sacrificed for progress and security whilst others insist on privacy being paramount in a free society (Sir Tim...

    Provided By Network Box

  • Case Studies // Oct 2009

    Network Box Helps Biwater Group Keep Its Network Flowing

    The Biwater Group designs and constructs water and wastewater systems across the world (the name 'Biwater' - or 'Two waters' - was adopted because of its involvement in the provision of clean water and the treatment of wastewater). Employees need to access the Internet in the course of their work,...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: Charnwood Borough Council

    Like many organisations, CBC was using a number of different security technologies to protect itself against the burgeoning myriad of online threats. For example, it outsourced its firewall, VPN, email filtering and web filtering security to separate companies. However, CBC discovered that not only is this method cost-ineffective, it also...

    Provided By Network Box

  • Case Studies // Jan 2010

    Network Box Scores With Tottenham Hotspur

    Tottenham Hotspur FC is one of the UK's top premiership football clubs and is also a modern sports business, dealing with large amounts of electronic correspondence and internet traffic from fans, business partners and sponsors. The need for a secure network that can defend against malware and spam was a...

    Provided By Network Box

  • Case Studies // Jan 2010

    The Acorn Group Chooses Network Box

    The Acorn Group is one of the largest independent estate agency networks in the South East of England and is ranked in the top 20 estate agents across the UK. The company's consistent growth combined with its publicly available email addresses meant that securing its IT network from the latest...

    Provided By Network Box

  • Case Studies // Jan 2010

    Sunderland AFC Uses Network Box

    Sunderland AFC is a UK premiership football club. The club has over 120 full-time employees at three different sites in the UK. Network security is a top level priority for the club, and a need to defend against the vast amounts of spam and malware it was seeing was an...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: Jeyes

    Jeyes manufactures, markets, sells and distributes household cleaning and hygiene products throughout the world in more than 60 countries. The biggest threat Jeyes faced was from malicious spam and email-borne viruses. Thirty percent of the 100,000 inbound emails each month was spam, the primary Internet threat to Jeyes; and around...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: PDD

    PDD is a product innovation consultancy, working with some the world's leading brands, such as Sony Ericsson, Orange and Levis, in the invention, conception and development of products that are used in daily life. It employees 65 staff at its UK headquarters in London. It needed a system that didn't...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: Pluswork Group

    The Pluswork Group is a temporary and permanent recruitment specialist with offices in the North West of England. It has recruitment specialists at various office locations, as well as on the road visiting candidates and clients; and this posed a wide variety of IT security issues. The company wanted to...

    Provided By Network Box

  • Case Studies // Jan 2010

    Network Box Case Study: Selectaglaze

    The main issue was that while most provided a reasonable user interface, there was a steep learning curve to get to grips with all of the different security and policy based aspects. It quickly realised that a managed service might be a more cost-effective and secure approach requiring less day-to-day...

    Provided By Network Box

  • Case Studies // Oct 2008

    Network Box Case Study: Hillary Blinds

    Hillarys Blinds is the largest manufacturer of made-to-measure window blinds in the UK and has a turnover in excess of ?90 million. The challenge was using three separate security solutions but soon found that managing multiple technologies can become a burden. Also, it needed a solution that would enable the...

    Provided By Network Box

  • Case Studies // Apr 2009

    Securing Vital Infrastructure Network: Network Box and ES Pipelines

    ES Pipelines is an independent gas transporter, taking gas to businesses and homes across the UK. The majority of communication between customers and suppliers is done via email, much of it containing confidential information, and so knowing its network is secure is of prime importance. Network Box has provided ES...

    Provided By Network Box

  • White Papers // Jan 2011

    Forgotten Security Part II: Routing, the Hole in the Wall

    Many companies have routing where the path that data takes to arrive at a workstation differs from the path that the data takes back to the originator. If one of these paths goes through a connection tracking firewall while the other path does not, the packets will be blocked. This...

    Provided By Network Box

  • White Papers // May 2011

    Adding SPF to Your Anti-Spam Solution

    The Sender Policy Framework (SPF) is an open standard that introduces a grammar for domains to describe the email they send. These descriptions are published in the Domain Name System (DNS), and Simple Mail Transfer Protocol (SMTP) receivers may use these descriptions to authenticate email and to better apply local...

    Provided By Network Box

  • White Papers // Mar 2012

    Privacy Preserved Collaborative Secure Multiparty Data Mining

    In the current modern business environment, its success is defined by collaboration, team efforts and partnership, rather than lonely spectacular individual efforts in isolation. So the collaboration becomes especially important because of the mutual benefit it brings. Sometimes, such collaboration even occurs among competitors, or among companies that have conflict...

    Provided By Science Publications

  • White Papers // Mar 2008

    An Optimized Device Sizing of Analog Circuits using Particle Swarm Optimization

    Day by day more and more products rely on analog circuits to improve the speed and reduce the power consumption(Products rely on analog circuits to improve the speed and reduce the power consumption day by day more and more.). For the VLSI implementation analog circuit design plays an important role....

    Provided By Science Publications

  • White Papers // Nov 2011

    Geographical Division Traceback for Distributed Denial of Service

    Internet is highly used in the most of the people day to day life applications. It is a very essential resource for every one of them. It is the people duty to secure this important resource from all the threats. One way of ensuring internet security is making the internet...

    Provided By Science Publications

  • White Papers // Jan 2012

    Session Initiation Protocol Security: A Brief Review

    The Session Initiation Protocol (SIP) is an application layer used for signaling protocols specified by the Internet Engineering Task Force (IETF). SIP has recently become the main signaling protocol for Internet applications, thus allowing the implementation of a number of features using SIP, such as video conferencing, online gaming, peer-to-peer...

    Provided By Science Publications

  • White Papers // Jan 2012

    Flexible Topology Migration in Optical Cross Add and Drop Multiplexer in Metropolitan Ring Network

    In general, there are two types of optical node that used in present optical network where it depends on what type of topology that is implemented. OXC-based optical node is selected as a node distribution in the mesh network while OADM-based optical node is suitable for use in ring topology...

    Provided By Science Publications

  • White Papers // Feb 2012

    Computation of Private Key Based on Divide-By-Prime for Luc Cryptosystems

    Public key cryptosystem is a way that is used a secret communication between the sender and receiver, without needing for a secret key exchange and it can used for create a digital signature. Public key cryptosystem is a widely used technology around the world, which enables information to be transmission...

    Provided By Science Publications

  • White Papers // Jan 2012

    Purpose-Based Versus Flow-Based Access Control for Privacy

    Advances in information technology and the emergence of privacy-invasive technologies have made it necessary to introduce privacy regulations that impose restrictions on handling of Personal Identifiable Information (PII). According to current thinking, "PII privacy protection can only be achieved by enforcing privacy policies within an organization's online and offline data...

    Provided By Science Publications

  • White Papers // Jan 2012

    Dynamic Approach to Defend Against Distributed Denial of Service Attacks Using an Adaptive Spin Lock Rate Control Mechanism

    The frequency, severity and sophistication of Distributed Denial of Service (DDoS) attack pose a serious threat to the availability of evolving Internet services. DDoS attack is an incident in which a user or organization is deprived of the services of a resource the people would normally expect to have. They...

    Provided By Science Publications

  • White Papers // Jan 2011

    Fault Detection and Classification in Power Electronic Circuits Using Wavelet Transform and Neural Network

    Nowadays, the prime focus of industries is in the field of control engineering. It concerns mainly to monitor a system, detect the occurrence of fault in the system and identify the type of fault and its location. This is mainly to done to protect the system and avert any possible...

    Provided By Science Publications

  • White Papers // Feb 2011

    Mobile Ad Hoc Network Security for Reactive Routing Protocol With Node Reputation Scheme

    A Mobile Ad-hoc NETwork (MANET) can be considered as the collection of wireless mobile nodes organized to create a temporary connection between them. Neither pre-defined network infrastructure nor centralized network administration exists to assist in the communication in MANETs. Through a direct shared wireless radio links nodes communicate with each...

    Provided By Science Publications