Category Archives: IT Security

Threats top 10 threats in 2011

I have been looking into Threats, or to be more accurate Top 10 security threats for 2011. I just like Top ten lists! By reading this article I notes’ that much of the weakness lies in the newest thing happening … Continue reading

Posted in IT Security, Week 38 | 6 Comments

Technical Guide to Information Security Testing and Assessment by NIST, Special Publication 800-115

One of the  many NIST guidelines that can help to assess, analyze and develop IT security strategies in organization is to use NIST’s Special Publication 800-115 Technical Guide to Information Security Testing and Assessment Recommendations of the USA National Institute … Continue reading

Posted in IT Security, Week 38 | Leave a comment

Example of IT Risk Assessment Report

For some time we have been looking on the National Institute of Standards and Technology (NIST) 800-30, “Risk Management Guide for Information Technology Systems” guidelines. So you don’t have to invent new wheel, I have found example of IT Risk … Continue reading

Posted in IT Security, Week 37 | Leave a comment

Top Windows Security Threats pinpointed by SANS/FBI

This article has been announced years ago though it still has an importance in relation to security threats found on Windows platform. The SANS/FBI have pinpointed these threats included with a report on the top list. Experienced administrators have opportunity … Continue reading

Posted in IT Security, Week 37 | Leave a comment

SANS Security Threats for 2012&2013

It looks like some people were thinking about the upcoming years 2012,2013 and what new security threats will appear (apparently it contradicts with Nostradamus predictions but he is not talking about IT Security so I don’t care). I chose to … Continue reading

Posted in IT Security, Week 37 | Leave a comment

security controls

What is security control? It’s a technical or administrative safeguard and a counter measures to avoid, counteract or minimize loss or unavailability due to threats acting on their matching vulnerability, i.e., security risk. The institute United States General Accounting Office … Continue reading

Posted in IT Security, Week 37 | 1 Comment

Vulnerabilities

What are vulnerabilities? Vulnerabilities are a weakness in a computer construction or software construction which allows an attacker to gain control or access to network or a computer/s. On the website Network world I come across an article about Top … Continue reading

Posted in IT Security, Week 36 | Leave a comment