Category: IT SECURITY
What is Computer Forensics? Computer Forensics, also known as Cyber Forensics refers to the analysis of information in the computer systems, with the objective of finding any digital evidence that can be used for legal proceedings, but also to discover Read more…
What is Penetration Testing? A penetration test is a practice of assessing the security of an IT infrastructure by securely trying to exploit vulnerabilities that may exist in operating systems, inappropriate configurations, application errors, or end-user behavior. The penetration testing Read more…
What is a SCADA system? SCADA – Supervisory Control and Data Acquisition is an industrial system framework that includes both hardware and software architecture to control, monitor and analyze an industrial process. SCADA is an application software that enables managers, Read more…
What is ISO/IEC 27035? In today’s business world, information security incidents are considered to be uncertain risks which can seriously damage a business. Thus, organizations must take actions to promptly identify, evaluate and effectively manage the incidents. The ISO/IEC 27035 Read more…
What is ISO/IEC 27034? The ISO/IEC 27034 provides a systematic approach that guides organizations to implement security concepts, principles, and processes in the application security structure. Application security is an international concept that supports the information security framework and guides Read more…
What is ISO/IEC 27032? The term ISO/IEC 27032 refers to ‘Cybersecurity’ or ‘Cyberspace security,’ which is defined as the protection of privacy, integrity, and accessibility of data information in the Cyberspace. Therefore, Cyberspace is acknowledged as an interaction of persons, Read more…