Category: 27001

0

OpenPGP Mail Encryption and Related Tools For Linux, Windows

OpenPGP is a email encryption standard used by a lot of people. This standard is defined by OpenPGP Working Group of the Internet Engineering Task Force (IETF). The standard is proposed with RFC 4880 . The OpenPGP is derived from PGP software which is created by Phil Zimmermann. OpenPGP Windows...

0

How To Install and Use GPG Encrytion In Linux In Order To Encrypt and Decrypt Files and Folder?

Security is important part of the today’s IT operations. There are a lot of tools which provides some part of the secure operations. GNU Privacy Guard or simply GPG is a one of them. It provides encryption, decryption, digital signatures and signing. Install GPG To Ubuntu, Debian, Mint and Kali...

0

How To Delete File and Folders Completely and Securely with sdelete in Windows?

User PC and Servers process a lot of data where some of them are secret. This data may be deleted with conventional ways but this may not enough. Because file systems generally removes file metadata but continue to hold real data. Microsoft sysinternals provides sdelete or secure delete tool which...

1

How To Generate 4096 bit Secure Ssh Key with Ssh Keygen

Ssh is secure protocol used to manage remote systems like Linux, BSD, UNIX, network devices event windows operating systems. The traffic between systems are encrypted. Ssh uses asymmetric keys in order to encrypt and made traffic invisible to the others those resides between systems in the network. The encryption power...

0

Security Roles and Responsibilities In Security Governance

Security role is the part where an individual plays in a complete organization security implementation and administration. In this tutorials different security roles and responsibilities in an organization. Senior Manager Senior Manager is responsible for all organization security. Senior Manager will have following roles and responsibilities Sign off all policy...

0

Data Classification and Categorization with Benefits

Data classification is important part of the ISO 27001 and Enterprise Security Governance. Data classification will set labels and categories to the given data types. These types will be used to set secrecy, sensitivity, confidentiality levels. If we set all data high security level or classification this will create high...

0

Alignment of Security Function To Strategy, Goals and Mission

Security management policy will contain following security policy related steps; Security Policy Creation Security Policy Implementation Security Policy Enforcement every organization have some strategy, goals, mission and objectives. Security management planning will align security function with these. While creating a security plan there are things we should be aware and...

0

Introduction To Security Governance with CIA – Confidentiality , Integrity, Availibility

Security Governance are implemented with management concepts, security policies, implementation etc. While working with these items we need some parameters to understand and describe security in IT environment. There is CIA which is actually the synonym of Confidentiality , Integrity and Availability . These are used to define the level and status of...

0

Introduction To Certified Information System Security Professional (CISSP)

There are a lot of security certifications in the IT sector. But only some of them are very prestigious and popular. Perhaps the most known and most respected security certificate is Certified Information System Security Professional (CISSP) certification. In this post we will get generally information about certification steps, topics,...

0

How To Secure Windows From Malware and Unwanted Executables With Applocker?

Windows ecosystem generally works with 3 party applications easily while installing and running them. This creates some risk especially for the novice users. Windows administrators generally want to restrict users applications and executables to make their operating system more secure. Windows recently launched a feature named AppLocker . As its name...

Enjoy this blog? Please spread the word :)