Computer Viruses and how to prevent from them
Computer Viruses and how to prevent from them Introduction Computers have become an integral part of almost each and every as aspect of our lives. It has become a means of communication,Read More…
Computer Viruses and how to prevent from them Introduction Computers have become an integral part of almost each and every as aspect of our lives. It has become a means of communication,Read More…
Cyber-crime Introduction Cyber-crime refers to those criminal activities that are carried out with the help of internet. Computer and/or other hardware and software are used to carry out these types of crimes.Read More…
Discuss security, disaster preparedness, and disaster recovery concerns for traditional and Web- based systems. Should this be a standard issue for all organizations? In my opinion, security, disaster preparedness, and disaster recoveryRead More…
ISO/IEC 15408- Common Criteria Table of Contents Introduction. 3 General Model 4 Introduction to the general model 4 Assets and countermeasures. 5 Evaluation. 6 Role of Ethics in Data Protection. 6 Conclusion.Read More…
Maintenance is an essential task that is often considered to be dull. In information security, penetration testing may be wrongly perceived as being a “hacker-like” activity. In fact, when done correctly, ethicalRead More…
The theories of change management (based on the Lewin model) add insight to how users deal with change. How would you deal with change? The Lewin Model consists of three stages. FirstRead More…
Suppose you started working as a network manager at a medium-sized firm with an Internet presence, and discovered that the previous network manager had done a terrible job of network security. WhichRead More…
There are many different organizations working on their vision of a high-speed Internet. Is this a good or bad? Would we be better off just having one organization working on this andRead More…
What is the future of PKI? Acceptance of PKI solutions—and product sales—has fallen short of early estimates. What would the “killer app” for PKI sales look like? Though a temporary drop hasRead More…
A recent topic of interest in the industry is the Intrusion Prevention System (IPS). Many vendors have created enhancements to IDS systems to make them into IPSs. Look into current developments inRead More…