Discussion thread for reorganization of "Probably the Best Free Security List in the World"

Discussion in 'other security issues & news' started by MrBrian, Aug 21, 2014.

  1. guest

    guest Guest

    Tough I endorse that move, please re-consider about the potential disadvantages.

    I don't see much issue whether with "Intrusion Protection" or "Intrusion Prevention". Both are fine IMO. As for the proposal, am I right to interpret both the "Continuous" and "Periodic" can also serve as real-time protection? I'm assuming "Continuous" means non-stop protection while "Periodic" means triggered automatic auditing by certain intervals, like WinPatrol Free.
     
  2. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    What disadvantages?

    Right.
     
  3. guest

    guest Guest

    Definitely there would be some names get removed. Although perhaps not much of a problem considering that there are only very few items with $ tag.

    Well okay, from my own point of view I'm still fine with the latest proposal. Looks fine to me.
     
  4. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Since I last posted, I've soured on highly hierarchical categorization because:
    1. It seems to splinter areas of focus.
    2. It could cause too much trouble for the list authors in the future.
     
  5. guest

    guest Guest

    So... how is it going now?
     
  6. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  7. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Any opinions about using this (see the pdf for the full map) as the basis?
     
  8. ako

    ako Registered Member

    Joined:
    Nov 16, 2006
    Posts:
    667
    This seems very ambitious and challenging. I'm afraid it will be very difficult to built the categories. This map can be used to get ideas but I don't think it can be used without major modifications.
     
  9. guest

    guest Guest

    Too much hierarchy IMO.
     
  10. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Thank you for the feedback :).

    Here's what I have right now. It's not complete yet, but you can see it's a lot different from the map from post #57. I'll be working on it more this weekend.

    Auditing - System Activity
    Auditing - System Configuration
    Authentication
    Availability - Backup
    Availability - Rescue
    Confidentiality - Encryption
    Confidentiality - Other
    Integrity - Anti-Fraud
    Integrity - Anti-Malware
    Integrity - Data Integrity
    Integrity - Firewalls
    Integrity - Other System Protection
    Integrity - Virtualization
     
  11. taleblou

    taleblou Registered Member

    Joined:
    Jan 9, 2010
    Posts:
    1,349
    There are tons of new free security softwares around and I feel probebly the best security list has not been updated that much for a long time. I still see some discontinued and very old softwares still listen while many new softwares are not listen there. I think a house cleaning is needed.
     
  12. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    You are right. Part of what I'm doing during the reorganization is checking each link for issues. I also have a backlog of over 450 candidates for addition, collected mainly from Wilders browsing. It's too bad there aren't more than 24 hours in a day :).
     
  13. taleblou

    taleblou Registered Member

    Joined:
    Jan 9, 2010
    Posts:
    1,349
    can't wait to see the new additions. Best of luck.
     
  14. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Latest proposal:

    Access Control - Application-Oriented - see https://www.wilderssecurity.com/thr...tions-and-sandboxes-a-survey-of-paper.366712/
    Access Control - Device-Oriented
    Access Control - User-Oriented
    Activity Inspection and Logging
    Anti-Malware
    Application Security - Alternative Software
    Application Security - Application Development Security
    Configuration
    Data Security - Backup
    Data Security - Confidentiality
    Data Security - Database Security
    Data Security - Integrity
    Identity and Authentication
    Intrusion Detection and Prevention
    Network Security - Firewalls
    Network Security - Messaging Security
    Network Security - Proxies
    Network Security - Remote Access
    Network Security - TCP/IP Security
    Network Security - Virtual Private Networks
    Network Security - Web Security
    Network Security - Wireless Security
    Recovery and Response
    Security Assessment
    Virtualization

    Feedback welcome.
     
  15. guest

    guest Guest

    Kind of less interesting compared to my latest personal approval, but I guess it will work well.
     
  16. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Are you referring to the one that you made? If not, which post # are you referring to?
     
  17. guest

    guest Guest

    No, I was referring to post #46, although for the sake of simplicity I slightly prefer post #28.
     
  18. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    If anyone else has a preference for a certain one, feel free to say so.
     
  19. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Latest proposal:

    Network Security - Firewalls
    Network Security - Email and Other Messaging Security
    Network Security - Other
    Network Security - Proxies
    Network Security - Remote Access
    Network Security - TCP/IP Security
    Network Security - Virtual Private Networks
    Network Security - Web Security
    Network Security - Wireless Security
    System Security - Anti-Intrusion - Anti-Malware
    System Security - Anti-Intrusion - Configuration
    System Security - Anti-Intrusion - Other Third-Party Software
    System Security - Authenticity
    System Security - Availability - Backup
    System Security - Availability - Recovery
    System Security - Confidentiality
    System Security - Cryptography
    System Security - Integrity
    System Security - Other
    System Security - Resources
    System Security - Security Assessment
    System Security - Software Development Security
    System Security - System Information and Activity
     
  20. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    Looks good, I;m not sure what to add.
     
  21. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Thank you :).
     
  22. ako

    ako Registered Member

    Joined:
    Nov 16, 2006
    Posts:
    667
    Beautiful.
     
  23. guest

    guest Guest

    So this would be the final design then?
     
  24. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Not necessarily. Also, just like the current list, there will be more categorization within each of the listed categories. I'll post about those as I get to them.

    If anyone has suggestions for improvement, I'd love to hear them.
     
  25. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Latest proposal:

    Network Security - Firewalls
    Network Security - Email and Other Messaging Security
    Network Security - Other
    Network Security - Proxies
    Network Security - TCP/IP Security
    Network Security - Virtual Private Networks
    Network Security - Web Security
    Network Security - Wireless Security
    System Security - Anti-Intrusion - Anti-Malware
    System Security - Anti-Intrusion - Configuration
    System Security - Anti-Intrusion - Other Third-Party Software
    System Security - Anti-Intrusion - Security Assessment
    System Security - Anti-Intrusion - Security Suites
    System Security - Authenticity
    System Security - Availability - Backup
    System Security - Availability - Recovery
    System Security - Confidentiality
    System Security - Integrity
    System Security - Other
    System Security - Resources
    System Security - Software Development Security
    System Security - System Information and Activity

    Should I make "Security Assessment" a subset of "Configuration", since it could be considered testing one's configuration?
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.