Tree key concepts of Information Security every IT expert must know. Confidentiality : Refers to protect information from disclosure to unauthorized parties. Method used are : Encryption Enforcing file permissions Access Control list to restrict access to sensitive information. 2. Integrity: Refers to protect information from being modified by unauthorized parties. Method used is: Hashing Data you receive and comparing it with the hash of the original message. 3. Availability : Refers to ensuring that authorized parties are able to access the information when needed. Methods used are : Back up is key Priority Redundancy might be appropriate Having an off-site location ready to restore services in case anything happens to primary data center. ...
Posts
Showing posts from December, 2017
- Get link
- X
- Other Apps
Loapi malware capable of destroying Android phones Kaspersky Lab researchers discovered a new versatile malware capable of cryptocurrency mining, launching DDoS attacks and so much more that it destroyed the Android phone after two days of testing. Link: https://www.csoonline.com/article/3243266/security/loapi-malware-capable-of-destroying-android-phones.html
- Get link
- X
- Other Apps
5 reasons to take a fresh look at your security policy. Evolving ransomware and DDoS attacks, new technology such as IoT, and changing user behavior are all good reasons to revise your security policy. https://www.csoonline.com/article/3209160/security/5-reasons-to-take-a-fresh-look-at-your-security-policy.html
TRAINING SESSION HAS TAKEN PLACE ON 22 DECEMBER 2017,TALKING ABOUT PREVENTION AND DETECTION MALWARE ATTACK
- Get link
- X
- Other Apps

T hanks to Dr. Arun Lakhotia @DrArunL, Founder and CEO of Cythereal ( www.cythereal.com), from University of LOUISIANA, for training session talking about how to prevent & investigate zero-day malware attacks by malware analysis. Respect to Dr. Parag ,Dr Digvijay,Mr Dharmesh Dave Lectures from Gujarat Forensic Sciences University.
- Get link
- X
- Other Apps
North Korea rejects U.S. accusation, says it is not linked to any cyber attacks https://www.reuters.com/article/us-northkorea-missiles-cyber/north-korea-rejects-u-s-accusation-says-it-is-not-linked-to-any-cyber-attacks-idUSKBN1EF0BD?feedType=RSS&feedName=technologyNews&utm_content=buffer19b21&utm_medium=social&utm_source=linkedin.com&utm_campaign=buffer
what does Cyberspace mean
- Get link
- X
- Other Apps
Definition - What does Cyberspace mean? Cyberspace refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication. It is a large computer network made up of many worldwide computer networks that employ TCP/IP protocol to aid in communication and data exchange activities. Cyberspace's core feature is an interactive and virtual environment for a broad range of participants. Link :https://www.techopedia.com/definition/2493/cyberspac