Press ESC to close

0 93
5
Harshan
5 Min Read

The process of information classification is one of the most fascinating and perplexing problems in the study of information security management. Classifying data has been around for quite some time, so it was probably the first part of information security to be overseen. Governments, militaries, and private companies have been using secret classification for their data since long before the advent of computers. However, the precise workings of the mechanism were unclear.

0 46
4
Harshan
4 Min Read

Context-based access control is a firewall software feature that intelligently filters TCP and UDP packets based on application layer protocol session information.  CBAC can be configured only to allow specified TCP and UDP traffic through a firewall when the connection is initiated from the protected…

0 92
4
Harshan
4 Min Read

Dynamic Access Lists solve a different problem that traditional ACLs cannot solve quickly. Imagine a few users accessing a set of servers. ACLs match user host IP addresses. The legitimate user’s IP address changes if she borrows a PC, uses DHCP, takes her laptop home, etc. Each new IP address requires editing a traditional ACL. This caused painful administration and security holes.

0 155
5
Harshan
5 Min Read

An extended access list, a reflexive access list allows for the dynamic combination of two access lists. If the outbound access list recognizes a remote connection, the inbound access list will be activated to permit bidirectional traffic. With the conclusion of this interactive session, the remote host is once again denied access to the inbound access list.

0 64
1
Harshan
1 Min Read

The most common type of two-factor authentication (2FA) is a one-time code texted to your phone, but the most secure type is a physical security key. The accounts you designate will be inaccessible to anyone who doesn’t know your password and possession of your security key.

0 40
5
Harshan
5 Min Read

A scope management plan is developed to ensure the project covers all of the bases and leaves out anything that isn’t essential. The primary purpose of a scope management plan is to detail the steps to define, organize, and validate the project’s scope.