Free and Open Source Software Security

This post explains some specific aspects of security related to free and open source software (FOSS). FOSS Security Risks There are some risks that are should be taken especially into account on FOSS projects. Lack of Maintenance Community-driven FOSS is…

Information Technology

This post is an index for the main topics related to information technology (IT) offered on this blog. Technical Fields of Information Technology Fields of information technology featured on this blog: Computer Hardware Computer hardware include the physical parts of…

Information Security Governance

Information security governance is a part of governance, risk and compliance (GRC). Information Security should take into account the organization objectives and identified risks to define information security objectives. To achieve these goals, the IS strategy must be defined. Information…

Secrets Management

Secrets management is a practice that allows developers to securely store sensitive data such as passwords, keys, and tokens, in a secure environment with strict access controls. A common person connected to the internet must use a few dozen of…

Microservices

This post summarizes ideas about microservices, that is a type of distributed system. This post is part of a series of articles about distributed systems. Description of Microservices IT microservices is a service-oriented architecture (SOA) where the application is splitted…

Software-defined Network

A software-defined network (SDN) is an approach to network management that enables dynamic and programmatically network configuration. This is a contrast with traditional networks, where the network is defined by using hardware components. An SDN looks like a single logical…

Database Security

This post explains some aspects of IT security on databases. It is part of the main post about introduction to IT security. Database Concurrency Issues Lost updates occur when one transaction writes a value to the database that overwrites a…