cyber crime

Home/Tag:cyber crime

Datadog

2020-09-01T12:52:33+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , |

These days, one of the most important aspects of cyber security is network monitoring. We have already published a detailed post on the importance and how to monitor the network. We suggest you read it. In this post, we'll take a look at Datadog Network performance monitor to help you understand the different aspects of [...]

PRTG

2020-09-01T12:52:43+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , |

PRTG Network Monitor is an agentless network monitoring software. This network monitor tool consists of two main system parts: Core server and Probe. ------------------------------------------------------------------------------------------------------------------------------------------------- These days, one of the most important aspects of cyber security is network monitoring. We have already published a detailed post on the importance and how to monitor the network. We [...]

Password Managers

2020-09-23T14:09:15+00:00Categories: Network Administration, Network Security|Tags: , , , , , , , , , , , , , |

Why is it recommended to use password managers? These days, every new website and application we sign up for is another password we have to remember. In fact, the number of passwords we need to remember is so high that we may forget all or part of them. If we write down passwords in a [...]

Assess Security Impact of Acquired Software

2020-07-16T07:38:19+00:00Tags: , , , , , , , , , , |

Assess Security Impact of Acquired Software When an organization combines with or purchases another organization, the acquired source code, repository access and design, and intellectual property should analyze and review to assess security. Also, the phases of the development cycle should review. There are some use cases that bear further discussion: Open source: Never [...]

Assess the Effectiveness of Software Security

2020-07-15T12:52:11+00:00Tags: , , , , , , , , , , , |

Assess the Effectiveness of Software Security In this section of this tutorial, we'll take a look at assessing the effectiveness of software security . These days, one of the most important aspects of cyber security is assessing the effectiveness of application security. Once the application is ongoing and software has been programmed, the next [...]

Implement and Manage Physical Security

2020-07-15T12:05:01+00:00Tags: , , , , , , , , , , , , , |

Implement and Manage Physical Security Physical security is yet another important aspect of the security professional’s responsibilities, and refers to securing physical assets such as land, buildings, computers, and other company property. We've discussed about important physical security concepts and technologies in detail before. If you need to refer to the contents of these [...]

Implement Disaster Recovery Processes

2020-07-15T12:07:22+00:00Tags: , , , , , , , , , , , , , , |

Implement Disaster Recovery (DR) Processes The general process of disaster recovery include: Responding to the disruption Activation of the recovery team Ongoing tactical communication Assessment of the damage Recovery of critical assets and processes Response The first thing to consider when an incident occurs is whether the disaster recovery process is needed. If the [...]

Implement Recovery Strategies

2020-07-15T12:09:43+00:00Tags: , , , , , , , , , , , , , , , , , , , , |

Implement Recovery Strategies Recovery strategies are important because they have a big impact on how long the organization will be down or have a degraded environment. Backup Storage Strategies In order to cover all reasonable scenarios, backup storage strategies often involve the following: 1- Secure offsite storage: Store backup media at a remote location. [...]

Understand and Participate in Change Management Processes

2020-07-16T08:15:19+00:00Tags: , , , , , , , , , , |

Understand and Participate in Change Management Processes In this part of this tutorial, we'll take a look at change management processes to help you understand the different aspects of change management processes. System, network, and application always require changes. A system that does not change will become less secure over time, as security updates [...]

Go to Top