In the first part of this article series we covered the skills that a network security analyst should have in order to do their job properly. Now, this second part of the article will put these skills into context by simulating a "day in the life" of a network security analyst. I will give real life examples of why you need the specific skills that I noted earlier. Following this will be a brief discussion on the value of certification, and some of the ones I would suggest.
Electronic voting machine vendors should make their source code available for scrutiny by state elections officials, the head of a federal voting commission said Tuesday.
DeForest Soaries, chairman of the Election Assistance Commission, or EAC, said disclosing the source code--the line-by-line instructions that make up an electronic voting machine's software--would help to restore public trust in the elections process. Vendors should not "have the right to keep this source code a secret," Soaries told a dinner gathering of Maryland election officials.
IT professionals and their businesses have learned the hard way in recent years that disaster can strike at anytime and that they must be prepared. Companies unable to resume operations within ten days of a disaster hit are not likely to survive, stated a study from the Strategic Research Institute. In an attempt of protection, upwards of 60-70 percent of companies begin a disaster recovery plan, but never finish due to the overwhelming and complexity of plans or they gets put on the back burner.
A vulnerability in the Oracle's E-Business Suite allows a remote
attacker to execute arbitrary script on a vulnerable database system.
Exploitation may lead to compromise of the database application, data
integrity, or underlying operating system.
Oracle E-Business Suite is a set of applications and modules that
enables an organization to manage customer interactions, deliver
services, manufacture products, ship orders, collect payments, and
other tasks using a single database model.
During its special on computer attacks on June 3, the Dutch current-affairs programme, Zembla, demonstrated to television viewers just how easy it is to break into wi-fi networks and gain access to confidential information.
The networks found to be lacking in security were operated by the Dutch airline, KLM, and the Ministry for Public Works and Water Management (Rijkswaterstaat).
At Amsterdam?s Schiphol Airport, Zembla uncovered 15 security breaches in KLM?s wireless computer-connections in the arrival and departure halls, and at its office in Schiphol Oost.