Tag Archives: security

Domain Name System (DNS) – Application Layer Protocol

By | June 17, 2023

The Domain Name System (DNS) is a vital application layer protocol that enables efficient name resolution on the internet. It translates human-readable domain names into machine-readable IP addresses, facilitating seamless web navigation. This manual excerpt explores DNS’s hierarchical structure, resource records, messaging protocols, caching mechanisms, security measures, load balancing strategies, and privacy-enhancing mechanisms. Understanding DNS is crucial for managing network resources, optimizing performance, and ensuring reliable and secure internet connectivity.

IDS / IDPS Detection Methods: Anomaly, Signature, and Stateful Protocol Analysis

By | June 16, 2023

“Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IDPS) are crucial for network security. Explore anomaly detection, signature detection, and stateful protocol analysis methods, their strengths, limitations, real-world applications, and best practices for effective deployment and management. Enhance your network security posture and mitigate risks.”

Domain Name System (DNS) Security Threats

By | May 16, 2018

DNS Security Threats The Domain Name System (DNS) is a service used on both the Internet and private networks to translate Internet Protocol (IP) addresses to Fully Qualified Domain Names. Example, this service allows someone to type a FQDN like www.zymitry.com to reach the Zymitry web site instead of having to type in the domains… Read More »

Security Policy Example – IRT Access & Authorization Policy

By | January 27, 2018

Policy Example   SunSpot Credit Union Computer Incident Response Team—Access & Authorization Policy   1.0       Policy Statement This policy applies to SunSpot Credit Union employees, temporary workers, contractors, and consultants who use or access SunSpot Credit Union information systems and computers.   2.0       Purpose/Objectives Definitions for this policy are as follows: SunSpot Credit Union: (SCU).… Read More »

Security Policy Example – Remote Access

By | January 27, 2018

  SunSpot Health Care Provider Remote Access Policy for Remote Workers & Medical Clinics   1.0       Policy Statement It is SunSpot Health Care Provider (SHCP) policy to protect Information Resources based on risk against accidental or unauthorized disclosure, modification, or destruction, and assure the Confidentiality, Integrity, and Availability (CIA) of clinic and patient data. Apply… Read More »

Security Policy Template for Hand-Held Devices

By | January 25, 2018

Hand-Held Device use has become common place in today’s business environment to include company owned assets, and personal “Bring Your Own Device” (BYOD)’s. Security of Hand Held Devices normally spans over many of the other standard domains making it practical to treat them as a separate domain.. The SANS Reading Room article; Security Policy for… Read More »

Virtual Private Network (VPN) Security and Monitoring Controls

By | January 24, 2018

A Virtual Private Network (VPN) is a group of network hosts that can transfer encrypted data between themselves on a Virtual Private Network. The technology creates a safe encrypted connection, usually over public networks such as the internet, that allows remote users and locations such as branch offices, to securely access and share resources. The… Read More »

Basics of Security Awareness: Users are the Weakest Link

By | January 23, 2018

Basic Principles of Security Awareness. Security experts consider system users the weakest link in information security. User skill levels and experience can greatly vary, and unlike automated controls, human users can be subject to fatigue, or be distracted, which can lead to mistakes resulting in vulnerabilities. Security awareness training is often a user’s first experience… Read More »

Primary Advantages of COBIT, ISO 27000, and NIST

By | January 22, 2018

The following is a list of the primary benefits of the COBIT, ISO 27000, and NIST frameworks: COBIT COBIT allows much broader scope and takes into account all IT management processes. Geared towards a method of successfully executing key policies and procedures. It is often used to tie together controls, technical issues and risks, within… Read More »

IT & Security Framework and Policy Development Team

By | January 22, 2018

The IT security policy framework is the foundation of an organizations information security program. The framework consists of a library of documents, but is just not a collection of documents. The framework and its documents are used to build an organizations processes, determine appropriate technologies to use, and lay the foundation for policy enforcement. The… Read More »