Estonia learned how to combat from cyber attacks


Estonia is a country of many legends. Apart from traditional training and apprenticeships it is already a good habit among Estonian ICT companies to exchange information and experiences in various fields. Developers come together to introduce their newest tricks, testers discuss how to find flaws in systems before end users are unpleasantly surprised, cyber defence guys have formed an unofficial alliance to stay alert and be … Continue reading Estonia learned how to combat from cyber attacks

Preventing Network Attacks in Cisco ASA


Basic Threat Detection Overview Using basic threat detection, the security appliance monitors the rate of dropped packets and security events due to the following reasons: •Denial by access lists •Bad packet format (such as invalid-ip-header or invalid-tcp-hdr-length) •Connection limits exceeded (both system-wide resource limits, and limits set in the configuration) •DoS attack detected (such as an invalid SPI, Stateful Firewall check failure) •Basic firewall checks … Continue reading Preventing Network Attacks in Cisco ASA