This article summarizes the key offences pointed out in the Information Technology Act, 2000 and includes amendments made in the year 2008.
Continue reading “Information Technology Act – Offences & Penalties”
This article summarizes the key offences pointed out in the Information Technology Act, 2000 and includes amendments made in the year 2008.
Continue reading “Information Technology Act – Offences & Penalties”
Knowing these excel shortcuts takes you a long way in saving your valuable time while working with MS Excel.
Sarbanes Oxley Act also known as SOX was enacted in the year 2002 in the United States in response to various corporate scams. The objective of the enactment has been to protect the shareholders and the general public from accounting errors and fraudulent business practices. The Act is administered by the Securities Exchange Commission and is applicable to public companies.
Asymmetric encryption rules seem to confuse people as to when to use a private or a public key and for what purpose. Given below is a table which gives in lucid form of what key to use, when to use and for what purpose.
As we begin a new year, I thought it would be a good time to reflect upon some major information security breaches of 2009. The list of the organizations involved makes this list very interesting. What makes this list even more interesting is the analysis of the breach- which indicates that the incidents could have been averted by adopting some fundamental security best practices.
Continue reading “A list of major security breaches of 2009”
While Windows 7 is getting a rave review (unlike Vista) and more and more users are migrating to Windows 7, Windows XP continues to be prevalent. So as 2010 rings in, here are some tips and tweaks to make your Windows XP secure and faster.
What the Information Security manager should aim for
There is a lot of confusion on what constitutes a 3G technology.
Traditional authentication mechanisms for online banking have been password and/or a one time password from a dedicated token. Variants or a combination of these two authentication types have been deployed by most banks across the globe. Increasingly these traditional customer authentication methods are being challenged and defeated. Continue reading “Responding to Authentication challenges in Online Banking”