Friday , 5 March 2021
Home / Search Results for: computer security

Search Results for: computer security

The Computer Security Act of 1987

The Computer Security Act requires federal agencies to identify and protect computer systems that contain sensitive information. This law requires agencies that keep sensitive information to conduct regular training and audits and to implement procedures to protect privacy. All federal agencies must comply with this act. Note: For more information on the Computer Security Act, visit http://epic.org/crypto/csa/.   The Cyber …

Read More »

Security Biz Tricked Social Media Phishers

Security Biz Tricked Social Media Phishers

A UK-based cybersecurity vendor has detailed how it turned the tables on an angler phishing operation posing as Virgin Media support on Twitter. Angle phishing is a kind of attack that you are unaware about at the moment. Basically, there are some posts on social media that contain harmless content.  According to Experian,  Angler phishing is the practice of masquerading …

Read More »

Copy of Chinese Spy Chip Used in Security Training

Copy of Chinese Spy Chip Used in Security Training

The following reports from the Chinese spies infiltrated the supply chain of the servers which are assembled by the Supermicro Computers Inc., New York based CYBERGYM has recently launched a latest infrastructure security combat training program. CYBERGYM said that they have developed the training which could help the organizations prepare for such attacks. While making this training as realistic as …

Read More »

43% of Security Pros Could Execute Insider Attack

43% of Security Pros Could Execute Insider Attack

43% of Security Pros Could Execute Insider Attack: A recent survey took place of nearly 200 IT professionals about insider threats that were found nearly half of the participants who believed that they could easily attack their organizations from the inside. In a blog post earlier this week Imperva researchers who reported on insider threats and they revealed the findings …

Read More »

Application Security

Application Security

The Application Security: There are a number of issues to be cognizant of when it comes to application security.  Many of these have been addressed—or will be addressed—in other posts where discussion is more relevant, but the following is a list of those issues that CompTIA wants you to be aware of: Key Management: Key management is an area of …

Read More »

Goals of Mobile Security

Goals of Mobile Security

Mobile Security: Mobile operating system comes in four flavors: Blackberry, Windows Mobile, Google Android, and Apple iOS. Of these, the Apple iOS and Google Android operating systems are by far the ones most commonly found on modern devices. In order to simplify the examination of mobile operating system and devices in this post, the discussion will consider only iOS and …

Read More »

Firewall Configuration in Network Security

Firewall Configuration

Firewall Configuration: Not all firewalls or firewall setups are created equally, so you need to be familiar with each setup and how it works. Firewalls can be set up and arranged in several ways, each offering its own advantages and disadvantages. In this section we will cover each method. Bastion Host: A bastion host is intended to be the point …

Read More »

Georgia Government Computer Servers Targeted With Ransomware Attack

Georgia Government Computer Servers Targeted With Ransomware Attack

Ransomware Attack on Georgia Government Computer: A cyber attack has been occurred within the Dawson Country Georgia which is targeting the Government computer servers. According to the experts of the country IT analysts Will Stattuck, the Dawson Country servers which were attacked on the Monday afternoon, April 23rd. Shattuck also has updated the country commissioners and the audience members at …

Read More »

Complying with Privacy and Security Regulations

Complying with Privacy and Security Regulations

Complying with Privacy and Security Regulations: An organization’s security management policies don’t exist in a vacuum. Regulatory and governmental agencies are key components of a security management policy. These agencies have made large improvements over the last several years to ensure the privacy of information; several laws have been passed to help ensure that information isn’t disclosed to unauthorized parties. …

Read More »