I was talking with Laura Chappell about useful security tips since she "lives and breathes" security. As a bit of background, last year, she received the international Award for Professionalism founded by the NPA and given out at the Interop Conference in Vegas. Some of you may have caught her packed sessions at Microsoft TechEd conferences or HP Enterprise Symposiums. I know from my talks with some of you, you are familiar with her "Internet Safety for Kids Project" which she founded together with the "Protocol Analysis Institute."
Anyways, I asked her about the best ways to perform a security vulnerability audit on your network and she provided this list:
***Well, Stephen, there are so many ways to go about this so I'll just start spewing out options:
Laura shares more of her best practices and provides her viewpoint on security in an upcoming interview. Look for it here...
Thank you,Stephen Ibaraki
You have useful links at your site... Nice work!
Laura has some valuable viewpoints on how to best engage in security analysis as a career. She recently shared this:
"A solid knowledge of TCP/IP communications is critical when analyzing, optimization, troubleshooting and securing a network. Reconnaissance processes and exploits travel across the network to the target. You need to differentiate between ‘normal’ network communications, anomalies and blatant attacks. With that solid communications knowledge you can separate network issues from application issues and dramatically reduce the time needed to interpret your network traffic. Once you build that solid foundation, optimization, troubleshooting and security tasks can be performed faster and more accurately."
I have blogged about Laura's work before. This is the third interview in the series Blogged Down with...