Today we learn cryptography

I have talked about a lot of ways of protecting systems and information. Protect through security policies, authentication, unique passwords, the CIA, etc. But there is still more. There is a way of transmitting data so that only those for whom the data is intended can read it. This method or tool for protecting information in information security and computer systems is called cryptography.

Image result for cryptography memes

Continue reading “Today we learn cryptography”

Access for everyone. Well, for everyone authenticated.

Have you ever been asked to enter your credentials when trying to access a website or some sort of information? Maybe to access your school’s webpage, your work’s site or a social network? Yes, by credentials I may be referring to username and password or any combination of things to authenticate yourself. Of course, this is called authentication.

Image result for access control meme

Continue reading “Access for everyone. Well, for everyone authenticated.”

Live long and read the security policy

Companies should have an idea on how to protect their physical and information technology assets. They, usually, state these measurements in a document, commonly known as a security policy. And what do we find in that document? Well, as easy as it is, we find security policies.

When talking more in depth about information security, a security policy sates the rules, laws and/or practices for computer network access. And it regulates how organizations will manage, protect, and distribute their sensitive information. It may also lay the framework of the security of the company. Therefore, security policies are important in companies.

Continue reading “Live long and read the security policy”