Wednesday , November 21 2018

April, 2018

  • 1 April

    Government and Military Classification

    Government and Military Classification

    Government and Military Classification: The U.S government and the military have slightly different types of concerns relating to information classification. Government agencies are concerned about privacy and national security. Because of this, a unique system of classification and access controls has been implemented to protect information.   The following is …

March, 2018

  • 30 March

    Surviving Viruses

    Surviving Viruses

    Surviving Viruses: A virus is a piece of software designed to infect a computer system. Under the best of circumstances, a virus may do nothing more than reside on the computer, but it may also damage the data on your hard disk (HDD), destroy your operating system, and possibly spread …

  • 26 March

    Antivirus Software

    Antivirus Software

    Antivirus Software: The primary method of preventing the propagation of malicious code involves the use of antivirus software. Antivirus software is an application that is installed on a system to protect it and to scan for viruses as well as worms and Trojan horses. Most viruses have characteristics that are …

  • 25 March

    Symptoms of a Virus Infection

    Symptoms of a Virus Infection

    Symptoms of a Virus Infection: Many viruses will announce that you are infected as soon as they gain access to your system. They may take control of your system and flash annoying messages on your screen or destroy your hard disk. When this occurs, you will know that you are …

  • 24 March

    Understanding Certificate Revocation

    Understanding Certificate Revocation

    Understanding Certificate Revocation: Certificate revocation is the process of revoking a certificate before it expires. A certificate may need to be revoked because it was stolen, an employee has moved to a new company, or someone has had their access revoked. A certificate revocation is handled either through a certificate …

  • 23 March

    Certificate Policies

    Certificate Policies

    Certificate Policies: Certificate policies define what certificates do. A CA can potentially issue a number of different types of certificate—say, one for email, one for e-commerce, and one for financial transactions. The policy might indicate that it isn’t to be used for signing contracts or for purchasing equipment. Certificate policies …

  • 22 March

    Working with Registration Authorities and Local Registration Authorities

    Working with Registration Authorities and Local Registration Authorities

    Working with Registration Authorities and Local Registration Authorities: A registration authority (RA) offloads some of the work from a CA. An RA system operates as a middleman in the process: It can distribute keys, accept registrations for the CA, and validate identities. The RA doesn’t issue certificates; that responsibility remains …

  • 21 March

    Using a Certificate Authority

    Using a Certificate Authority

    Using a Certificate Authority: A certificate authority (CA) is an organization that is responsible for issuing, revoking, and distributing certificates. A certificate is nothing more than a mechanism that associates the public key with an individual. It contains a great deal of information about the user. Each user of a …

  • 20 March

    Hardening DHCP Services

    Hardening DHCP Services

    Hardening DHCP Services: Dynamic Host Configuration Protocol (DHCP) is used in many networks to automate the assignment of IP addresses to workstations. DHCP services can be provided by many different types of devices, including routers, switches, and servers. The DHCP process involves leasing TCP/IP address to a workstation for a …

  • 19 March

    Hardening Web Servers

    Hardening Web Servers

    Hardening Web Servers: Web servers are one of the favorite areas for attackers to exploit because of the reach they have. If an attacker can gain access to a popular web server and take advantage of a weakness there, they have the opportunity to reach thousands, if not hundreds of …