Category: Application

Alignment of Security Function To Strategy, Goals and Mission

Security management policy will contain following security policy related steps; Security Policy Creation Security Policy Implementation Security Policy Enforcement every organization have some strategy, goals, mission and objectives. Security management planning will align security function with these. While creating a security plan there are things we should be aware and have limited resources to use. Restrictions We will have mainly

Continue reading

Introduction To Security Governance with CIA – Confidentiality , Integrity, Availibility

Security Governance are implemented with management concepts, security policies, implementation etc. While working with these items we need some parameters to understand and describe security in IT environment. There is CIA which is actually the synonym of Confidentiality , Integrity and Availability . These are used to define the level and status of current security situation. We will look all of them and

Continue reading

Introduction To Certified Information System Security Professional (CISSP)

There are a lot of security certifications in the IT sector. But only some of them are very prestigious and popular. Perhaps the most known and most respected security certificate is Certified Information System Security Professional (CISSP) certification. In this post we will get generally information about certification steps, topics, price etc. Information Systems Security Certification Consortium (ISC) CISSP exam

Continue reading

How To Secure Windows From Malware and Unwanted Executables With Applocker?

Windows ecosystem generally works with 3 party applications easily while installing and running them. This creates some risk especially for the novice users. Windows administrators generally want to restrict users applications and executables to make their operating system more secure. Windows recently launched a feature named AppLocker . As its name suggests it simply restricts the executables and applications those can

Continue reading

Windows Process Explorer To Get Detailed Information About Processes

Windows provides different tools to list and get information about processes. The task manager can be used to list and manage process. But task manager have limited capabilities. So if we are a pentester or system administrator who lives in deep water we can use process explorer for more functionality. Download Process explorer is provided as Sysinternal utilities and downloaded

Continue reading

What Is TPM? Manufacturing, Management and Maintenance Of TPM

Trusted Platform Module or TPM is an international standard for a secure cryptoprocessor.  This standard is developed by Trusted Computing Group and standardized by International Organizational Standardization (ISO) and International Electrotechnical Commission (IEC)  with number ISO/IEC 11889 in 2009. Versions TCG continues to revise the  TPM specification. Latest version is released at October 2014 with number 2.0 Manufacturing TPM hardware

Continue reading

How To Scan WordPress Sites With Wpscan (Tutorial) For Security Vulnerabilities?

WordPress is very popular Content Management System (CMS). It is used by diverse range of users by different purposes and areas. This makes WordPress project very dynamic and rich. The security of the wordpress is important because of the its user base. There are also a lot of different plugins which can create security holes in the wordpress sites. In

Continue reading

limits.conf File To Limit Users, Process In Linux With Examples

limits.conf configuration file is used to limit user, domain, process related metrics. Limits.conf is related with pam_limits module. Configuration File There is configuration file named limits.conf and located at /etc/security/ . The default content of this file is like below.

As we can see all configurations are commented so they are not effective. There is also a directory which is use to store

Continue reading
Open

Enjoy this blog? Please spread the word :)