Tuesday , September 25 2018
Home / Jahanzaib Khan (page 10)

Jahanzaib Khan

Jahanzaib Khan is Web Designer & Ethical Hacker. He Who has been working since 2014, and is managing several successful websites on the internet for about 3 years. Jahanzaib-khan.com

YouTube TV Goes Down During World Cup

YouTube TV Goes Down During World Cup

The Croatia scored and the score is 1-1 against the England. If you are a YouTube TV subscriber, you might not know about the YouTube TV was down for almost 40 minutes. Update: it’s back just in a time for extra time. People who have paid $40 a month to …

Read More »

THE OSI MODEL

THE OSI MODEL

The OSI (Open System Interconnection) reference model is a layered network model. The model is of course abstract; we do not directly run the OSI model in our systems (most now use the TCP/IP model). Rather, it is used as a reference point, so “Layer 1” (physical) is universally understood, …

Read More »

Apple Releases New iPad, FaceID Ads

Apple Releases New iPad, FaceID Ads

Apple has successfully releases their handful of new ads which is promoting the iPad’s portability and convenience over both laptops and the traditional paper solutions. The 15 second ads which focus on how the iPad can make even the most tedious things travel, notes, paperwork, and makes things bit easier. …

Read More »

MOBILE DEVICE ATTACKS

MOBILE DEVICE ATTACKS

A recent information security challenges is the number of mobile devices ranging from USB flash drives to laptops that are infected with malware outside of a security perimeter, and then carried into an organization. Traditional network based protection, such as the firewalls and intrusion detection systems, are powerless to prevent …

Read More »

DATABASE SECURITY

DATABASE SECURITY

Database present unique security challenges. The sheer amount of data that may be housed in a database which requires the special security consideration. As we will see shortly in the “Inference and aggregation” section, the logical connections database users may lead to inference and aggregation attacks, requiring database security precautions …

Read More »

SYSTEM VULNERABILITIES, THREATS, AND COUNTERMEASURES

SYSTEM VULNERABILITIES, THREATS, AND COUNTERMEASURES

System threats, vulnerabilities, and countermeasures describe security architecture and design vulnerabilities, as well as the corresponding exploits that may compromise system security. We will discuss countermeasures, or the mitigating actions of that to reduce the associated risk. COVERT CHANNELS A covert channel is any communication that violates security policy. The …

Read More »

Protecting Data in Motion and Data At Rest

Protecting Data in Motion and Data At Rest

Data at rest is stored data that resides on a disk and/or in a file. Data in motion is data that is being transferred across a network. Each form of data requires different controls for protection, which we will discuss next. Drive and Tape Encryption Drive and tape encryption protect …

Read More »

Twitter’s Efforts to Suspend Fake Accounts Have Doubled

Bots, your days of tweeting the politically division nonsense might be over. The Washington Post reported on Friday that in the last few months Twitter has suspended accounts to stop the disinformation running on their platform. Washington Post reports that Twitter has suspended as many as 70 million accounts between …

Read More »

Information Security Governance

Information Security Governance

Information security governance is the information security in the organizational level, which includes senior management, policies, processes, and staffing. It is also the organizational priority provided by the senior leadership, which is required for a successful information security program.   Security Policy and Related Documents Documents such as policies and …

Read More »