Links

Hacking and Breaches

Ipviking – live hacking

SANS Reading Room – Numerous Case Studies on Various Breaches

Information is Beautiful – World’s Biggest Data Breaches & Hacks

Hackers Dailey

PDF of SANS Case Study on 2013 Target Breach

Lockheed’s White Paper on Intelligence-driven Computer Network Defense

Some of the most common hacking techniques

Fundamentals of Hacking – SANS White Paper

Lockheed Martin’s Cyber Kill Chain

General AIX Security:

AIX Information Center

Information Center – PowerSC Standard Edition Welcome Page

PowerSC 1.1.6 PDF

PowerSC Presentation Page

PowerSC Redbook

PowerSC Download Link – ESS

Request a quote for PowerSC if not entitled

AIX V6 Advanced Security Features – Introduction and Configuration

Service and Support Best Practices for AIX

Fix Level Recommendation Tool (Learn how to patch your AIX or VIOS)

Very Useful FixCentral Interface for searching ifixes,  apars

FLRTVC Online

FLRT Vulnerability Checker

Fix Central

AIX Web Download Pack Site(Download specific filesets related to AIX Security)

Managing Interim Fixes on AIX

CVE Home Page

The pdf for AIX 7 Security

Power Security Certifications

Power 7 EAL4+

Power 6 Common Criteria

AIX Operating System Certifications

AIX LDAP:

IBM Security Directory Server Knowledge Center

ITDS Download Page

AIX Licensing Terms for ISDS

Integrating AIX into Heterogenous LDAP Environments

IBM Tivoli Directory Server 6.3 – Administration Guide

ISDS General Tuning

ISDS – Debugging Replication

ISDS – the audit.log – IBM Presentation

White Paper on the AIX LDAP Client

ISDS fixes

LDAP Reference Book – Understanding and Deploying LDAP Directory Services

Redbook – Understanding LDAP

Useful Link for LdapSearches

Andrew Findlay-paper best practices for ldap

How to Verify SSL Certificates from a Shell Prompt

AIX Kerberos

AD integration with AIX and Kerberos

Configuring an AIX Client with Multiple Kerberos Realms

AIX Auditing:

AIX Auditing Redbook

IBM Systems Magazine Article on AIX Auditing

DeveloperWorks Article on Generating Audit Reports

Virtualization Security

PCI Virtualization Guidelines v2.0 (Downloads a pdf file)

NIST’s Secure Virtual Network Configuration for Virtul Machine (downloads a pdf file)

Cloud security

PCI Cloud Computing Guidelines (Downloads a pdf file)

Cloud Security Guidelines for IBM Power Systems

General Computer Information Security

CySAFE Cyber Assessment for Everyone (PDF File)

SANS – A Glossary of Security Terms

My Favorite CISSP Exam Guide

Threat Research Papers

NIST Computer Security Publications

Improving Security via Proper Network Segmentation

Operations Security (Opsec) – process for protecting data

Power Linux Security

Linux on Power Security – (IBM Knowledge Center)

Working with Certificates

Simply Put: How does certificate-based authentication work?

Miscelaneous

NIM Ports – (Maybe needed for TNC Configuration)

The Six Dumbest Ideas in Computer Security

Jay Kruemcke’s Blog

Getting Started with SSH Security

Using dsh to issue commands on many AIX systems

Removing ^M from AIX files

Recording SSH Sessions

Guidance for Multi-Factor Authentication(PDF Document)

Harvard Business Review: Why Execs Underinvest in Cyber Security

Deep-Thought-A-Cybersecurity-Story

IBM’s PCIe_Cryptographic_Coprocessor_Data_Sheet (a PDF)

Content Agnostic Malware Protection – PDF Explaining why Anti-Viruses misses 40% of Malware

Text Editing Tips For Smitty

The Importance of Patching for a Company (Equifax)

An Overview of the SSL or TLS Handshake

SSL vs. TLS – What’s the Difference

Difference Between Red and Blue Teams

The Dangers of Sudo

Blog on HMC Security

Securing SSH

Information about CIS SecureSuite

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: