Qadit Systems & Solutions Pvt Ltd has been empanelled by CERT-In as one of the few qualified IT Security Auditing organisations in the country.
Qadit System’s expertise and experience in the areas of Vulnerability Assessment and Information Security audit has ensured its inclusion in this very select list of firms that are empanelled currently. This re-empanelment is an acknowledgment of Qadit System’s technical expertise in areas of Information Security. Continue reading “Qadit Systems empanelled by CERT-In as a qualified IT Security Auditing organisation”
Cross-site scripting (XSS) is a type of security vulnerability typically found in web applications where attackers cause a web server to send a page that contains malicious HTML or other client side scripts to a victim’s browser.
Continue reading “Tech Terminology Demystified – Cross-site Scripting”
Tamil Nilam is the Tamil Nadu government’s land administration and management system. Tamil Nilam has been implemented in all rural Taluks of Tamil Nadu. Touch screen kiosks to disseminate information related to land records have been implemented in 127 Taluks. This G2C initiative has been a phenomenal success both in terms of revenue and reach.
Continue reading “India’s ambitious National e-Governance Plan”
Public key cryptography as we know it is actually the outcome of efforts to solve a major issue with symmetric encryption systems (such as the DES)-key distribution. Concepts such as private key and public key represent the final step in the solution to the problem of key distribution. Continue reading “A History of Public Key Cryptography”
Companies often end up investing huge amounts in creating logical and network security perimeters and at times physical security is relegated to the background. According to New York Post, A civilian official of the NYPD’s pension fund has been charged with taking computer data that could be used to steal the identities of 80,000 current and retired cops. According to news reports, Bonelli bypassed the security guard on duty by flashing an expired ID card. His name was also not on a list of authorized personnel. Continue reading “Physical Security – Welcome The weakest link in IT-security”
“I have a real time virus scan enabled. A full system virus scan consumes lot of my computer resources and time. So why should I run a full system virus scan regularly?”. This is a query which we come across frequently. This article tries to bring more clarity about full system virus scan and a real time virus scan. Continue reading “Is full system virus scan required when real time virus scan is enabled?”