Category Cybersecurity

snort

snort is one of the most popular intrusion detection system (IDS). It is free and open source software (FOSS). snort.conf snort.conf is a file located in Snort/etc/ ipvar HOME_NET any You can change ‘any’ with the IP you are protecting…

IT Intellectual Property

This post discusses some aspects of intellectual property (IP) focused on information technologies. Intellectual Property Legal Protection Measures Intellectual property protection mechanisms featured on this post: Copyright Copyright is a right by law that guarantees the creators of “original works…

Critical Infrastructure Legislation

This post features some critical infrastructure legislation. Critical Infrastructures Legislation by Country Countries: European Union EU critical infrastructures regulations: Network: France France critical infrastructures regulations: USA USA critical infrastructures regulations: NERC CIP North American Electric Reliability Corporation (NERC) Critical Infrastructure…

IT Security Models

This post features abstract IT security models. List of IT Security Models IT security models featured on this post: Belle-LaPadula Belle-LaPadula focuses on confidentiality. Biba Biba model focuses on integrity rather than confidentiality. Clark-Wilson Model Graham-Denim Model HRU Model Harrison-Ruzzo-Ullman…

VPN Services

A VPN service offers a public virtual private network (VPN), usually under a fee. VPN services are used to be able to surf the internet without servers being able to track you original IP or region. List of VPN Services…

PDF Security

This post is about aspects to take into account regarding PDF format and the security. PDF files are considered “immutable” and are used by many people to handle sensible documents, such as contracts or agreements. However, these documents are not…

Data Backup

This post is an introduction to data backup. Types of Data Backup Types of Data Backup: Full backup means that an exact copy of the original media is done. Differential backup means that only registries that have been modified since…

Linux Endpoint Security

This post talks about endpoint security on Linux OS. Linux Endpoint Hardening Tools Lynis Lynis is free and open source software (FOSS) tool to audit Unix-like OSs. It is developed by Dutch company CISOfy. Lynis official website Lynis code repository…

Artificial Intelligence Security

This post discusses some aspects of artificial intelligence regarding security. AI Chatbot Security Concerns Summary of AI Chatbot Security Concerns Upload Sensitive Information Users or employees may upload sensitive information to the website. Malicious use of the Application This aspect…