Category IT

Open Systems Interconnection

Open Systems Interconnection (OSI) was developed in 1977 by ISO. TCP/IP was developed in 1969. OSI Layers OSI model layers: A mnemonic way to remember these layers is to memorize the sentence All People Seem To Need Data Processing. The…

Mermaid software

Mermaid is a markup language to describe diagrams. It is less powerful than Vega. Its definition language is text DSL. It is HTML-native. There are open source implementations of it. Bibliography

snort

snort is one of the most popular intrusion detection system (IDS). It is free and open source software (FOSS). snort.conf snort.conf is a file located in Snort/etc/ ipvar HOME_NET any You can change ‘any’ with the IP you are protecting…

IT Intellectual Property

This post discusses some aspects of intellectual property (IP) focused on information technologies. Intellectual Property Legal Protection Measures Intellectual property protection mechanisms featured on this post: Copyright Copyright is a right by law that guarantees the creators of “original works…

Data Structure

Data Structures: Queue A queue follows the method “first in, first out” (FIFO). Heap A heap can be used to work on arithmetic operations using postfix notation. It follows the method “last in, first out” (LIFO). Tree A tree is…

Critical Infrastructure Legislation

This post features some critical infrastructure legislation. Critical Infrastructures Legislation by Country Countries: European Union EU critical infrastructures regulations: Network: France France critical infrastructures regulations: USA USA critical infrastructures regulations: NERC CIP North American Electric Reliability Corporation (NERC) Critical Infrastructure…

IT Frameworks

This post is about IT conceptual frameworks. Technical frameworks suchs as programming language frameworks are not covered by this post. IT frameworks: IT Governance Frameworks You can read this post about IT governance framework. An IT governance and management frameworks…

Algorithm

This post is about algorithms. Greedy algorithms are those where on each stage you make the best choice, and may not get the optimal solution but you may get a good one. Algorithms by Function Types of algorithms featured on…

IT Security Models

This post features abstract IT security models. List of IT Security Models IT security models featured on this post: Belle-LaPadula Belle-LaPadula focuses on confidentiality. Biba Biba model focuses on integrity rather than confidentiality. Clark-Wilson Model Graham-Denim Model HRU Model Harrison-Ruzzo-Ullman…

IT Governance Frameworks

This post is about IT governance frameworks. An IT governance and management frameworks relies on an EA architecture. You can read this post about EA architecture frameworks. List of IT Governance Frameworks IT Governance Frameworks feature: ISO/IEC 38500 ISO/IEC 38500…