Category IT Security

IoT Search Engines

This post features search engines for devices of the Internet of Things (IoT) List of IoT Search Engines IoT search engines featured on this post: Shodan Shodan is probably the most known IoT search engine. Official link FOFA FOFA is…

Single Sign-On

Single Sign-on (SSO) allows a user to access multiple applications with a single set of credentials. SSO Implementations SSO implementations: Kerberos Kerberos is both a SSO implementation and a AAA network protocol. You can read more about Kerberos on this…

Firewall

This post is an introduction to network firewalls (FW). Firewalls should be complemented with other controls like antivirus scanners, data loss prevention (DLP) solutions and intrusion detection system (IDS) tools. Types of Firewall Firewall classification criteria: Types of Firewall by…

Information Security Policy Frameworks

This post provides resources to create Information Security policies, standards, procedures and guidelines. Documenting IT Security Policy Frameworks IT Security Policy Framework Document Types IT security policy framework documents: Policy Policies would be like the constitution, while procedures are the…

Authentication Protocols

This post features computer network authentication protocols. Do not confuse the authentication protocols with the Authentication, Authorization and Accountability (AAA) protocols like RADIUS or TACACS+. Authentication protocols works in the OSI layers 2 and 3, and AAA protocols in layer…

Data Privacy

The terms data privacy, information privacy, data protection refers to data related to individuals, or personal identifiable information (PII). A privacy impact assessment (PIA) has the following goals: Data Privacy Regulations by Country Countries featured on this post regarding IT…