System Monitoring – Audit, Test, Monitor

As said before, system monitoring and usage of network traffic log files are important for gauging baseline performance and observing events. A baseline is used for later comparison, the system or users will compare the baseline to daily network traffic logs for any abnormalities. A log file records all events of daily use of a system, computer,…

SOA – Change Management Process

As we know, change is a never-ending cycle that affects every aspect of life. When change comes there will always be positive and negative reactions to it. Regarding significant cybersecurity-related technology changes, there will definitely be positive and negative reactions. There are plenty of potential reactions to change many of which depend on the situation that causes the…

Single-Sign-On (SSO)

As we know, Single-Sign On of SSO is a centralized session and user authentication service that allows a user to use login credentials across multiple applications. There are a few benefits to the the usage of SSO, such as less time spent on manually logging in to an application, reduces human errors, and can free up time that can be spent on…

Cyber Incidents & Law Enforcement

This is a complex topic as there are pros and cons that come with involving law enforcement with cybersecurity incidents. There are many reasons that companies do not decide to involve law enforcement in cybercrimes such as follows: Investigations will cause disruptions  Some attacks come from abroad, which makes tracking the hacker is increasingly difficult They might feel like…

Attacks, Threats, & Vulnerabilities

First, a threat and an attack are very different yet similar. A threat is a statement of intentionally inflicting harm on someone or something. While an attack is intentionally inflicting harm on someone or something. Exploits are actions that are fully utilized when accessing and taking advantage of flaws or vulnerabilities in a computer/security system. I do…

IoT Challenges & Risks

In my opinion, one of the biggest security risks and challenges to Internet of Things (IoT) technology is the lack of encryption. Encryption is one of the easiest ways to prevent attacks and hacks from happening, and as stated in this article, “These devices lack the storage and processing capabilities that would be found on a…

Computer Security vs. Information Security

Computer Security and Information Security are similar concepts, but focus on different areas. Computer Security focuses on the protection of the hardware, software, and other important parts from various threats and possible damage. A general example would be protecting the system from things like viruses and malware with software programs like Norton and McAfee. Information Security focuses on protecting…