Tech

Creating a A Company Culture for Security/week6(IT Security: Defense against the digital dark arts)

If you’re responsible for an organization of users, there’s a delicate balance between security and user productivity. We’ve seen this balance in action when we dove into the different security tools and systems together. Before you start to design a security architecture, you need to define exactly what you like it to accomplish. This will depend on what your company thinks …

Creating a A Company Culture for Security/week6(IT Security: Defense against the digital dark arts) Read More »

Defense in Depth/week5(IT Security: Defense against the digital dark arts)

Defense in depth is the concept of having multiple overlapping systems of defense to protect IT systems. This ensures some amount of redundancy for defensive measures. It also helps avoid a catastrophic compromise in the event that a single system fails, or a vulnerability is discovered in one system. Think of this as having multiple lines of defense. If an attacker …

Defense in Depth/week5(IT Security: Defense against the digital dark arts) Read More »

Securing Your Networks/week4(IT Security: Defense against the digital dark arts)

In this section, we’ll cover ways few to harden your networks. Network hardening is the process of securing a network by reducing its potential vulnerabilities through configuration changes, and taking specific steps. We’ll do a deep dive on the best practices that an IT support specialist should know for implementing network hardening. We’ll also discuss network security protection along with network monitoring …

Securing Your Networks/week4(IT Security: Defense against the digital dark arts) Read More »

AAA Security/week3(IT Security: Defense against the digital dark arts)

We’ll cover the three A’s of security, which are authentication, authorization, and accounting. We’ll cover exactly what they are, how they relate to each other, and their common implementations and protocols.  Authentication Best Practices Let’s kick things off with authentication, and by extension identification. You should be familiar with authentication in the form of username and password problems when accessing things like …

AAA Security/week3(IT Security: Defense against the digital dark arts) Read More »

Cryptology/week2(IT Security: Defense against the digital dark arts)

When you were little, did you and your siblings ever communicate in a secret language around your parents? It didn’t really matter what you were talking about, as long as your parents didn’t know what it was. That was the fun part, right? It may have seemed like a fun game when you were younger. But for as long as humans …

Cryptology/week2(IT Security: Defense against the digital dark arts) Read More »

Understand security threats /Week1(IT Security: Defense against the digital dark arts)

To be successful at cybersecurity, sometimes you need to put yourself in the mindset of an attacker and always be one step ahead. How people attack it and how do we defend against these attacks.  When you think of security, what’s the first thing you think of? It’s probably physical security, stuff like making sure your belongings are safe from potential …

Understand security threats /Week1(IT Security: Defense against the digital dark arts) Read More »

Basic Python

In this article, I am going to write some interesting Q&A or examples of basic Python concept. For Loop and while Returns the sum of all the divisors of a number, without including it. A divisor is a number that divides into another without a remainder. make the print_prime_factors function print all the prime factors …

Basic Python Read More »

About Big O

Big O notation is a mathematical notation that describes the limiting behavior of a function when the argument tends towards a particular value or infinity.  // by Wikipedia Big Os O(1) –> Constant- no loops O(n) –>Linear- for loops, while loops through n items O(log N) –> Logarithmic- usually searching algorithms have log n if they are sorted (Binary Search) O(n log(n)) …

About Big O Read More »

“Sorted CSS Colors” allows you to intuitively look up the names and color codes of 147 different colors from your browser.

Using CSS, which specifies the appearance of documents written in HTML or XML, you can freely specify the colors of text and pages. In order to specify a color, you need a color name, but looking up the names of 147 different colors can be tedious. In such a case, you can use the web …

“Sorted CSS Colors” allows you to intuitively look up the names and color codes of 147 different colors from your browser. Read More »

RSS
Follow by Email
LinkedIn
LinkedIn
Share