Wednesday , August 22 2018
Home / IT Security / Security+

Security+

EU Set to Legislate on Terror Content

EU Set to Legislate on Terror Content

The European Commission to force social networks to take down the terror content within an hour, in light of the apparent failure of self-regulation. Security commissioner, Julian King, told the FT on Sunday that he had “not seen enough progress” from the likes of Facebook, Google and Twitter on that …

Read More »

Historically High Q2 for Mobile Banking Trojan

The Historically High Q2 for Mobile Banking Trojan

Historically High Q2 for Mobile Banking Trojan: Mobile banking Trojan is ranked as the top security problem in the second quarter of 2018, which do includes the threats from a new cyber-espionage group, “Operation Parliament,” which is specially targeting the high profile companies of Middle East and North Africa, especially …

Read More »

Dixons Carphone: Breach Hit 10 Million Personal Records

Dixons Carphone: Breach Hit 10 Million Personal Records

Dixons Carphone has revealed its estimation of how much the customer data was stolen in the recent disclosed breach by almost nine million records. The UK retailer has revealed in June that the attackers had accessed almost 1.2 million personal data of Currys PC World and Dixons Travel Store customers. …

Read More »

Types of Biometric Controls

Types of Biometric Controls

There are a number of biometric controls that are used today; below we have the major implementations and their specific pros and cons with regards to access control security.   Fingerprints Fingerprints are the most widely used biometric control available today. Smartcards can carry fingerprint information. Many U.S government office …

Read More »

PERSONNEL SECURITY

PERSONNEL SECURITY

Users can pose the biggest security risk to an organization. Background checks should be performed, contractors who needs to be securely managed, and the users ought to be properly trained and made aware of the security risks, as we will discuss next. Security Awareness and Training Security awareness and training …

Read More »

THE OSI MODEL

THE OSI MODEL

The OSI (Open System Interconnection) reference model is a layered network model. The model is of course abstract; we do not directly run the OSI model in our systems (most now use the TCP/IP model). Rather, it is used as a reference point, so “Layer 1” (physical) is universally understood, …

Read More »

SYSTEM VULNERABILITIES, THREATS, AND COUNTERMEASURES

SYSTEM VULNERABILITIES, THREATS, AND COUNTERMEASURES

System threats, vulnerabilities, and countermeasures describe security architecture and design vulnerabilities, as well as the corresponding exploits that may compromise system security. We will discuss countermeasures, or the mitigating actions of that to reduce the associated risk. COVERT CHANNELS A covert channel is any communication that violates security policy. The …

Read More »

Information Security Governance

Information Security Governance

Information security governance is the information security in the organizational level, which includes senior management, policies, processes, and staffing. It is also the organizational priority provided by the senior leadership, which is required for a successful information security program.   Security Policy and Related Documents Documents such as policies and …

Read More »

Legal and Regulatory Issues

Though general understanding of the major legal systems and their types of law is really essential, it is critical that information security professionals understand the concepts described in the next section. Of course with the ubiquity of information systems, data and applications comes a host of legal issues that require …

Read More »