CISSP – Page 5 – POFTUT

Data Classification and Categorization with Benefits

Data classification is important part of the ISO 27001 and Enterprise Security Governance. Data classification will set labels and categories to the given data types. These types will be used to set secrecy, sensitivity, confidentiality levels. If we set all data high security level or classification this will create high cost and operational complexity and … Read more

Alignment of Security Function To Strategy, Goals and Mission

Security management policy will contain following security policy related steps; Security Policy Creation Security Policy Implementation Security Policy Enforcement every organization have some strategy, goals, mission and objectives. Security management planning will align security function with these. While creating a security plan there are things we should be aware and have limited resources to use. … Read more

Introduction To Security Governance with CIA – Confidentiality , Integrity, Availibility

Security Governance are implemented with management concepts, security policies, implementation etc. While working with these items we need some parameters to understand and describe security in IT environment. There is CIA which is actually the synonym of Confidentiality , Integrity and Availability . These are used to define the level and status of current security situation. We will … Read more

limits.conf File To Limit Users, Process In Linux With Examples

limits.conf configuration file is used to limit user, domain, process-related metrics. Limits.conf is related to pam_limits module. limits.conf Configuration File There is a configuration file named limits.conf and located at /etc/security/ . The default content of this file is as below. We can see that there are different columns named domain , type , item and value . #<domain> … Read more

How To Generate Ssh Key With ssh-keygen In Linux?

How To Generate Ssh Key With ssh-keygen In Linux?

Ssh is a secure and popular protocol for managing different types of IT devices like Linux systems, network devices, etc. What makes ssh secure is the encryption of network traffic. Network traffic is encrypted with different types of encryption algorithms. There is also user authentication done with encryption algorithms. These algorithms need keys to operate. … Read more

How To Verify Files and Signatures with PGP In Linux?

GnuPG is an opensource and popular alternative to the PGP. PGP provides encryption-related function. PGP provides a hash function like standard Linux packages. We will look ow to verify files downloaded from the internet with their PGP signatures to verify. Find PGP Information In this example, we will use the Apache source code. Apache PGP … Read more

How To Generate Random Numbers In Linux?

Generating random numbers can seem odd. But it is very important for security. Insecurity field whatever best cipher or algorithm you use if you can’t generate random numbers it is useless from point of view of security. So how can we generate random numbers in a Linux environment? Generate With urandom File urandom is a device … Read more

How To Use GPG To Create, List Keys and Sign Files?

GnuPG or GPG is Gnu version of Open PG standard implementation. It is very popular especially at personal use for mails etc. Here I will look basic usage of gpg2 in Linux command line interface. gpg2 is the second major version of gpg. Create/Generate Private GPG Keys Here we will create public and private keys … Read more

How To Check Password Strength In Linux With Cracklib?

Password security is important subject in IT. We call it password but actually it is a key to enter systems. Making authentication password-less by using key-based authentication is more secure but it is not always possible. So for the password-based authentication password strength is important. How Can We Make Passwords Strong Actually making passwords strong … Read more