Posted on

Blockchain: Fortifying Identity, Finance, and Privacy

Blockchain is a distributed ledger technology that is revolutionizing the way we conduct transactions, protect our identity, and preserve our privacy. By providing a secure and transparent platform for recording and verifying transactions, blockchain is fortifying the traditional finance system and unlocking new opportunities for innovation and growth. With its decentralized and immutable nature, blockchain…

Read more

Posted on

Ransomware is already out of control. AI-powered ransomware could be ‘terrifying.’

Hiring AI experts to automate ransomware could be the next step for well-endowed ransomware groups that are seeking to scale up their attacks. In the perpetual battle between cybercriminals and defenders, the latter have always had one largely unchallenged advantage: The use of AI and machine learning allows them to automate a lot of what…

Read more

Posted on 17 Comments

Information security

1Definition2Overview2.1Threats2.1.1Responses to threats3History4Basic principles4.1Key concepts4.1.1Confidentiality4.1.2Integrity4.1.3Availability4.1.4Non-repudiation5Risk management5.1Security controls5.1.1Administrative5.1.2Logical5.1.3Physical5.2Defense in depth5.3Security classification for information5.4Access control5.4.1Identification5.4.2Authentication5.4.3Authorization5.5Cryptography6Process6.1Security governance6.2Incident response plans6.2.1Preparation6.2.2Identification6.2.3Containment6.2.4Eradication6.2.5Recovery6.2.6Lessons Learned6.3Change management7Business continuity8Laws and regulations9Information security culture10Sources of standards11See also12References13Further reading13.1Bibliography14External links Definition Information Security Attributes: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are composed in three main portions, hardware, software and communications with the purpose to help identify and apply information security…

Read more