Popular Posts

Welcome to Logical Network Security




This Blog is about securing a Network from a Logical point of View with the understanding that before you can secure any network you must understand and learn how-to's

1.  Think like a hacker
2.  Mitigate the hackers moves.
 3. Build a secure network using Cisco security tools.
This blog will involve how-to's on vulnerabilities, exploits, reverse engineering, forensics, cybercrime, snake-oil security products, the security industry.
My editorial stance on this blog will espouse several common philosophies and positions:
    1.  Studying security vulnerabilities and offensive security tools and techniques is important to building secure systems and defending them.
    2.  Security testing tools must remain legal to build and freely distribute in order to maintain a level playing field between attackers and defenders.  Offensive security tools are necessary in penetration testing and other security testing in order to properly demonstrate the risk presented by security vulnerabilities.
   3.  The dominant approach to addressing vulnerabilities in consumer software and Internet infrastructure is essentially damage control at best.
 4.  Cisco’s Security Development Lifecycle is the best process for Defending The network perimeter because it follows a sound logical path.
    5.  Responsible vulnerability disclosure is the most appropriate approach to fixing a discovered vulnerability as long as the vendor is making a good faith effort at releasing a patch within an appropriate time frame.
 6. Full disclosure must be preserved as an option for cases when the vendor cannot nor will not address a vulnerability that places users at risk.




 

Tags


Powered by WidgetsForFree

Featured Content

Our Partners

© 2010 Logical Network Security. All Rights Reserved Thesis WordPress Theme Converted into Blogger Template by Hack Tutors.info