Security Architecture and Design

Home Security Architecture and Design

Change Management for the Network Security Team

All mature networks need a regular change management strategy invoked by a CAB-Change Advisor Board. The Network Security Team is no different. Any scheduled or even emergency changes, should be documented and approved by the CAB. In the case of emergency changes or upgrades, the correct procedures need to be followed and all stakeholders advised on a predetermined or reasonable...

Host Level IDS/IPS Devices

Host Level IDS-Intrusion Detection Systems or IPS Intrusion Detection and Prevention Systems are a very powerful way to protect your network. An IDS and IPS looks at network traffic and irregularities. They can be signature based meaning they can identify known attack signatures already in the wild or heuristic/behavioral based. The behavioral based devices provide a great many false positives...

Physical Security and the ROI some ideas to consider

The topic of ROI for Physical Security expenditures is extremely complicated and not easily quantifiable, so we will only briefly discuss some basic points and scenarios to consider as you may wish to dig a lot deeper in your own corporate environment to come up with a specific game plan. Security is often seen as a cost that yields no...

Defense in Depth-without it Physical Security cannot be effective

Physical Security is just one aspect of cyber security or information assurance. It cannot stand alone however. Physical Security needs to work in conjunction with a strong overall Cyber Security posture. One of the main aspects of a strong cybersecurity program is defense in depth. Defense in depth means that you have multiple layers of security, without it you are...

Save Time With Digital and Computer Forensics

Have you ever surprise why digital forensics as well as computer forensics were introduced to the marketplace? These services came into existence while computers were made accessible in all household. If you are going to look at the planet today, even the developing country are in fact having a hundred percent entrée to the Internet since personal computers can...

Top Story

HOT NEWS

Computer Forensics perceive Fraud throughout Latest Technology

A process of analyzing the info or data which are stored in any kind of electronic device or computer could be named as Computer...