Category IT Security

eIDAS

eIDAS (for “electronic IDentification, Authentication and trust Services”) is an European Union regulation. Electronic Signature Formats compatible with eIDAS eIDAS compelled the creation of electronic signature formats in order to comply with eIDAS regulation: There is no signature format compatible…

IPSec

Internet Protocol Security (IPSec) is a standard of IP security extensions that comprises a collection of protocols and that is used as an add-on for IPv4 and integrated into IPv6. Each IPsec VPN uses two security associations, one for encrypted…

Cryptography

Cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior. Some aspects of IT security (specifically confidentiality, integrity, authentication and non-repudiation) are directly related to cryptography. Cryptographic Algorithms You can read about encryption…

Process Improvement Frameworks

The frameworks featured on this post can be applied generally to process, but also to software. Because of this, they are sometimes confused with software development models. You can find an introduction to dedicated software development models on this post.…

Information Security Domains

Information security domains or areas are the different fields where the practice and studies of information security can be split. This post proposes different classifications for the security domains. Information Security Domain Proposals Information security domain proposals featured on this…

Common Criteria

ISO/IEC 15408, also known as Common Criteria for Information Technology Security Evaluation, Common Criteria or CC, is an international standard for testing and confirming the system security. Common Criteria supersedes the American TCSEC (Trusted Computer System Evaluation Criteria) or Orange…

IoT Search Engines

This post features search engines for devices of the Internet of Things (IoT) List of IoT Search Engines IoT search engines featured on this post: Shodan Shodan is probably the most known IoT search engine. Official link FOFA FOFA is…

Single Sign-On

Single Sign-on (SSO) allows a user to access multiple applications with a single set of credentials. SSO Implementations SSO implementations: Kerberos Kerberos is both a SSO implementation and a AAA network protocol. You can read more about Kerberos on this…