Category IT Security

Firewall

This post is an introduction to network firewalls (FW). Firewalls should be complemented with other controls like antivirus scanners, data loss prevention (DLP) solutions and intrusion detection system (IDS) tools. Types of Firewall Firewall classification criteria: Types of Firewall by…

Information Security Policy Frameworks

This post provides resources to create Information Security policies, standards, procedures and guidelines. Documenting IT Security Policy Frameworks IT Security Policy Framework Document Types IT security policy framework documents: Policy Policies would be like the constitution, while procedures are the…

Authentication Protocols

This post features computer network authentication protocols. Do not confuse the authentication protocols with the Authentication, Authorization and Accountability (AAA) protocols like RADIUS or TACACS+. Authentication protocols works in the OSI layers 2 and 3, and AAA protocols in layer…

Data Privacy

The terms data privacy, information privacy, data protection refers to data related to individuals, or personal identifiable information (PII). A privacy impact assessment (PIA) has the following goals: Data Privacy Regulations by Country Countries featured on this post regarding IT…

IT Crime Regulations

This post discusses some aspects related to IT or computer crime. The post focuses on regulations that prosecute malicious behavior related to computers or IT. If you want to read more about regulations concerning IT security focused on the implementation…

OT Security Conventions

This post features some operational technology (OT) Security conventions. It is part of the main post about OT Security. List of OT Security Conventions OT Security Conventions: Official link IIoT World ICS Cybersecurity Day IIoT World ICS Cybersecurity Day is…