What is an Information security policy?
- An IT Security Policy identifies the rules and procedures for all individuals accessing and using an organization's IT assets and resources.
- Effective IT Security Policy is a model of the organization’s culture, in which rules and procedures are driven from its employees' approach to their information and work. Its a living document that is continually updated to adapt with evolving business and IT requirements. Institutions such as ISO and NIST have published standards and best practices for security policy formation
What is a security process?
- Information security is a process that moves through phases building and strengthening itself along the way.
-Information Security process has many strategies and activities, we can group them all into three distinct phases - prevention, detection, and response.
What are security Procedures?
- A security procedure is a set sequence of necessary activities that performs a specific security task or function. Procedures are series of steps to be followed as a consistent and repetitive approach, a cycle to accomplish an end result.
- Once implemented, security procedures provide a set of established actions for conducting the security affairs of the organization, which will facilitate training, process auditing, and process improvement.
- Cheers
About :- The red-naped ibis (Pseudibis papillosa) Also known as the Indian black ibis or black ibis is a species of ibis found in the plains of the Indian Subcontinent. Unlike other ibises in the region it is not very dependent on water and is often found in dry fields a good distance away from water. It is usually seen in loose groups and can be told by the nearly all dark body with a white patch on the shoulder and a bare dark head with a patch of crimson red warty skin on the crown and nape. It...
About:- Rajmachi Fort (Killa) is one of the many historical forts in the rugged hills of Sahyadri Mountains (Western Ghats). It consists of two twin fortresses Shriwardhan Ballekilla and Manaranjan Balekilla, with a wide Machi (plateau) surrounding the two Balekillas. Udhewadi is a small village of about 22 houses situated on the machi, at the southern foot of Manaranjan Balekilla of Rajmachi Fort.
Rajmachi Fort is a popular destination for nature lovers, trekkers and...
Like any other Operating System (OS). Linux is an alternative OS for DOS, UNIX, Mac OS and Microsoft Windows platform. Linux belong to the family of "free and open source software" (FOSS). On September 17, 1991 the first distribution of LINUX kernel was released by "Linus Torvalds" freely. Later the project was taken up by open-source software collaboration community, which eventually contributed to todays multiple flavours distribution.
Linux was originally developed for personal computers based...
In continuation to Previous Post “What is LINUX”
Step 1: Choosing Linux Distribution and downloading it.The world of Linux is free open-source software with hundreds of active Linux distributions, and dozens of different desktop environments you could run on them. Linux distributions combine the Linux kernel with other software like the GNU core utilities, X.org graphical server, a desktop environment, a web browser, and more. To form a single operating system you can install. Do check...
In continuation to Previous Post “How to Install Linux”
Step 1 : Listing Files and Dirs - Some basic commands
clear -> clear the screenls -> list contentls -l -> list content in long listing formatls -al -> list all subcontent in long listing formatll -> an alias for the above ls -R -> list content recursivelyl. -> list hidden filesls -F -> list content and classify them
alias -> display...
What is Cloud Computing?
To be precise Cloud computing is a concept to leverage the IT infrastructure and support to optimize liability of the capital expenditure and risk to maintain and provide the digital services.
To be very simple its a pool of shared services offered and delivered on-demand often over the internet as required on dynamically configurable system resources and manageable higher-level services that can be provided with minimal downtime and effort in term of computing services...
In continuation of the Previous Post “What is Cloud Computing?”
Public CloudWhen a Cloud computing infrastructure is maintained and managed by the single cloud service provider and the shared resource services are rendered over the network to a different customer, and the cloud customer has no physical control what so ever over the infrastructure except the connectivity is called as a Public Cloud.Public cloud services can be free or have a comparatively lower cost of engagement....
In continuation to Previous Post “Cloud location-based deployment model”
As per NIST, there are three services offering model for Cloud services as IAAS, PAAS, and SAAS
Infrastructure as a service (IaaS)A cloud-based computing solution offering, where a complete infrastructure is been outsourced. Where a service provider delivers a complete set of preinstalled and configured hardware or software or both usually a LAMP or WAMP stack on a virtualized or containerized and sometimes physical...
In continuation to Previous Post “Cloud service-based offering model”
Distributed cloudGeographically distributed shared resources across multiple systems and locations assembled for serving the interconnected data on a single network or hub service as an application to the cloud computing technology platform is known as distributed cloud computing.Usually, it’s a community effort to reduce the overall cost of implementation, and expansions in terms of resource utilization require...
Information security is the process of protecting information and information systems from unauthorized disclosure, access use for destruction of intended information by Deletion, modification which can cause disruption of related services.
It deals with information, regardless of its format. It encompasses paper documents, digital data, and intellectual property.
CIA Triad: Confidentiality, Integrity, and Availability (CIA) have served as the industry-standard principles of information security.
Cybersecurity...