Computer and Network Security

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.

IBM Cognos® TM1®

IBM Cognos® TM1® is an enterprise planning software platform that can transform your entire planning cycle, from target setting and budgeting to reporting, scorecarding, analysis and forecasting. Available as an on-premise or on-cloud solution, and with extensive mobile capabilities, Cognos TM1 enables you to collaborate on plans, budgets and forecasts. You can analyze data, and create models – including profitability models – to reflect a constantly evolving business environment.

IBM Security Framework and IBM Security Blueprint

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever.

Defending against increasingly sophisticated DDoS attacks

In today’s technology-driven business world, high-profile cyber attacks on governments, corporations and financial markets are becoming increas-ingly common. As the threat of security breaches continues to grow, the types of attacks are becoming more diverse and complex. Distributed denial-of-service (DDoS) attacks occur when hackers overload servers with requests, rendering the network unavailable to its intended audience. Traditional DDoS attacks are now giving way to more sophisticated DDoS attacks that stress applications by initiating open-ended sessions or conversations.

Virtual Wireless Security Lab

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notoriously weak security standard. The password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP is an old IEEE 802.11 standard from 1999 which was outdated in 2003 by WPA or Wi-Fi Protected Access. WPA was a quick alternative to improve security over WEP.

How to make a DOS Attack

In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.