Hacking the WordPress Ecosystem
I delivered a speech at OWASP Romania InfoSec Conference 2013 in Bucharest (I took part in the organization of the
Read moreI delivered a speech at OWASP Romania InfoSec Conference 2013 in Bucharest (I took part in the organization of the
Read moreTo access the password policy in Windows just go to Start and type in the search box secpol.msc. Click on
Read moreThe ISO is developing a new series of security standards, the first of which is ISO 27001, Information Technology—Security Techniques—
Read morePhysical Security Controls Types of controls: – Administrative controls – Facility selection or construction – Facility management – Personnel controls
Read moreControls and Protections To protect hardware, software and media resources from: – Threats in an operating environment – Internal or
Read moreSecurity Model Is a statement that outlined the requirements necessary to properly support a certain security policy. Computer Architecture CPU
Read moreDatabase systems and database management Types of databases: – Hierarchical – Mesh – Object-oriented – Relational DBMS / Database Management
Read moreFundamental Principles of Security Security objectives Confidentiality: Provides the ability to ensure that the necessary level of secrecy is enforced.
Read moreOpen System Interconnect Model Protocol – Standard set of rules that determine how systems will communicate across networks. OSI Model
Read moreThis starts a series of posts that deals with CISSP CBK (Common Body Knowledge). The summary covers all the ten
Read more