Home > Topics > Security

Security

Articles

Introduction to Security in Computing, 5th Edition
The authors of Security in Computing, 5th Edition introduce their book, which is about the security of computers, their data, and the devices and objects to which they relate. In this book you will learn some of the ways computers can fail, or be made to fail, and how to protect against those failures.
Continue reading...
By Charles P. Pfleeger, Jonathan Margulies, Shari Lawrence PfleegerJan 30, 2015
Information Security Principles of Success
This chapter introduces these key information security principles and concepts, showing how the best security specialists combine their practical knowledge of computers and networks with general theories about security, technology, and human nature.
Continue reading...
By Jim Breithaupt, Mark S. MerkowJul 4, 2014
Security Program and Policies: Governance and Risk Management
This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
Continue reading...
By Sari GreeneApr 16, 2014
Network Defense and Countermeasures: Assessing System Security
Before you can begin administering system security, you must have a realistic assessment of the system’s current state of security. This chapter discusses the essential steps that you should follow in assessing a system’s security level.
Continue reading...
By William (Chuck) EasttomDec 16, 2013

See More Security Articles

Blogs

Brad YaleHow to Browse the Web Privately Using a Secure SSH SOCKS Tunnel

There are times when you want to browse the web but you want to do it privately, without being traced. Sure, you could go ahead and utilize the incognito feature built into most major web browsers however to truly browse in anonymity, there is nothing better than utilizing a secure SSH SOCKS Tunnel. In this quick "how-to", we are going to show you how to set up a secure SSH Socks Tunnel enabling you to route all your web traffic through your host.  

Continue reading...
By Brad YaleCommentsJanuary 16, 2015
Topics: Home & Office Computing,General Security and Privacy,Information Technology,Home Networking,Open Source,Microsoft Windows Desktop,Home Networking,Networking,Network Security,Routing & Switching,Network Administration & Management,Security,Linux/UNIX/Open Source,Operating Systems, Server,Network Design & Architecture
Brad YaleMobile Security: Physical Location Tracking
On the level of global commerce, we are addicted to devices. By the start of 2015, it is estimated there will be 3 billion Android devices in circulation around the world. Of those, there are roughly 19,000 distinct devices in operation. On the same accord, there are roughly 550 million active iOS devices globally with another few hundred million being phased out. As a global culture we love our mobile devices. Yet here is the thing, by all measures, our devices aren't all that secure. In both data and physicality, our devices have an operational tendency to betray us. 

This said, a question: what is more worrisome, mobile data security risks or mobile device physical security risks? 


Continue reading...
By Brad YaleCommentsDecember 5, 2014
Topics: Windows Phone,General Security and Privacy,Information Technology,iOS,Network Security,Data,Mobile Application Development & Programming,Android,Security
John  TraenkenschuhRisk Management Versus Vulnerability Analysis

Vulnerability Analysis is deceptively easy. Security Red Teaming requires more than that.

Continue reading...
By John TraenkenschuhCommentsOctober 21, 2014
Topics: Software Security,General Security and Privacy,Network Security,Security
Brad YaleHow the Internet Works: The Deep Web

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Continue reading...
By Brad YaleCommentsOctober 21, 2014
Topics: The Web/Virtual Worlds/Social Networking,Home & Office Computing,Access,General Security and Privacy,Information Technology,Web Services,Information Management,Network Security,Data,Security,Business & Management

See More Security Blogs