Tag it

Information Security Governance

Information security governance is a part of governance, risk and compliance (GRC). Information Security should take into account the organization objectives and identified risks to define information security objectives. To achieve these goals, the IS strategy must be defined. Information…

Microservices

This post summarizes ideas about microservices, that is a type of distributed system. This post is part of a series of articles about distributed systems. Description of Microservices IT microservices is a service-oriented architecture (SOA) where the application is splitted…

How to get the CCSP Certification

Certified Cloud Security Practitioner (CCSP) is a certification focused on cloud security and issued by American non-profit organization ISC(2) CCSP certification is more detailed than CCSK certificate, that is issued by Cloud Security Alliance (CSA). Some recommend to obtain CCSK…

Kerberos

Kerberos is both an ticket-based Authentication, Authorization and Accountability (AAA) network protocol and a SSO implementation: It is the most common ticket system, used for example in on-premise Windows networks. Kerberos issues tickets that can be presented to various services…

Data Science and Engineering

This post is about data science and engineering, that can be considered one of the main fields of information technology. You can read this post about information Technology DIKW Pyramid DIKW ordered from top to bottom: Data Structures Data structure…

ZX Spectrum Retro Emulation Consoles

This post summarizes consoles that emulate the hardware of the (now retro) console ZX Spectrum. List of ZX Spectrum Retro Emulation Consoles ZX Spectrum retro emulation consoles: ZX Spectrum Vega ZX Spectrum Vega was developed by Retro Computers. Its successor,…