A sharp choice.
Continue reading “Tech Demystified: Blade Servers – The Cutting Edge”
The role of information security has not been clearly defined in many organizations and these organizations face challenges such as lack of senior management’s commitment to information security initiatives, poor security planning, integration issues between business goals and information security, issues relating to accountability for implementing, monitoring and reporting on information security and so on. Continue reading “Business Model for Information Security – What is it all about?”
In my previous article, I had covered some tips on shock-proofing ourselves against the loss of our mobile phones. In this article, we shall look at some tips to ensure that when the hard-drive of your laptop / PC crashes, the loss is only of a computing resource and not of your data.
A firewall is a set of related programs located at a network gateway server that protects the resources of a private network from users on other networks. There are several types of firewalls used in the past and being used today based on their performance, technology, requirement, and level of security. Below here are most commonly used types of firewalls in the industry:
DDOS has been gaining acceptance in recent days due to troubled economics, religion and political reasons. This checklist serves as a basic/intermediate reference source for IS professionals who wish to have their critical IT assets protected against Distributed Denial Of Service Attacks commonly known as ‘DDOS’.
Information may sometimes be disclosed to people for whom it is not intended. This usually does not bode well for information stake holders. Information may be disclosed either intentionally or unintentionally. Information can be disclosed unintentionally by social engineering, covert channels, malicious code etc. Accidental disclosure includes object reuse and emanation.
Continue reading “Gone with the Wind – Unauthorised Disclosure of Information”
Social Networking Sites such as Facebook, Twitter have become increasingly popular, but so has security issues specific to these sites. Continue reading “Security Threats through Social Networking Sites”