- Blockchain for IT security. Blockchain technology enables data storage in a decentralized and distributed manner, which eliminates a single point of failure and prevents hackers from compromising large volumes of data. Due to its ability to quickly identify the data that has been manipulated, blockchain may become the core technology for highly regulated industries, like banking and law.
- Continuous Adaptive Risk and Trust Assessment. Since protection against behind-the-perimeter attacks is not sufficient today, Continuous Risk and Trust Assessment Approach (CARTA), which sees security as a continuous process that changes all the time and has to be regularly reviewed. Real-time assessment of risk and trust will enable organizations to make better decisions regarding their cybersecurity posture and mitigate the risks associated with aberrant user activities.
- Demand for advanced analytics. Because security software generates massive amounts of data, organizations need advanced analytics to gain a complete picture of what's going on in their IT environments. The growing adoption of user and entity behavior analytics (UEBA) technology will help companies understand their weak points better and promptly respond to any activities that might pose threat to data integrity.
- Organization-specific approach to IT security. Organizations will expect vendors to offer more personalized security solutions that address specific pain points depending on a company's size, IT environment complexity and budget. This will give businesses an opportunity to implement products that better match their needs, and small vendors with a single focus will be able to compete with larger but less flexible software providers.
The Netfilter Project Homepage http://www.netfilter.org
Source Code
Userspace code (tar.bz2) http://www.netfilter.org/files/iptables-1.3.0.tar.bz2
FAQ
Netfilter/Iptables FAQ http://netfilter.samba.org/documentation/FAQ/netfilter-faq.html
Firewall Forensics (What am I seeing?) FAQ http://www.robertgraham.com/pubs/firewall-seen.html
Network Intrusion Detection Systems - IDS http://www.robertgraham.com/pubs/network-intrusion-detection.html
Sniffing (network wiretap, sniffer) FAQ http://www.robertgraham.com/pubs/sniffing-faq.html
Linux IP Masquerade FAQ http://en.tldp.org/HOWTO/IP-Masquerade-HOWTO/
Firewall Admins Guide to Porn FAQ http://www.robertgraham.com/pubs/firewall-pr0n.html
Hacking Lexicon - hacking dictionary http://www.robertgraham.com/pubs/hacking-dict.html
Submit a FAQ Link or URL http://www.linuxguruz.com/iptables/#links
Scripts
Home LAN masquerading http://the-devil.dnsalias.net/home/extremist_MASQ
Home LAN ip6t...
Comments