Security – Utilize Windows

Securing Your PC: How to Choose an Antivirus Software For Windows 10

Win 10 PCs

Protecting your PC is something you should definitely prioritize. Fortunately, your Windows 10 PC is already partially protected with its built-in Windows Defender. Microsoft gave its pre-installed antivirus a massive upgrade in 2018, which added a sandbox mode to Windows Defender, effectively making it both an antivirus and an anti-malware software. As a result, your … Read more Securing Your PC: How to Choose an Antivirus Software For Windows 10

General guidelines for securing operating systems and networks

When we want to strengthen the security of the system, we we need to follow some basic guidelines. For hardening or locking down an operating system (OS) we first start with security baseline. Then we have to make sure that we’re using file systems that supports security, keep our OS patched and remove any unneeded services, protocols or applications. In general, … Read more General guidelines for securing operating systems and networks

Security Issues Related to Network Media and Removable Media

Media security has two primary components: cabling media security and removable media security. Cabling Security Cabling is often an overlooked aspect of designing a security for a network. Unfortunately, cabling problems are a common cause of network failures. Cabling should be protected from unauthorized physical access. We must also be considerate of what type of … Read more Security Issues Related to Network Media and Removable Media

Introduction to Public Key Infrastructure (PKI)

Before you start Objectives: Learn what is PKI, what are its components, and how do they work together. Prerequisites: you should know what is cryptography. Key terms: CA, certificate, PKI, model, trust, Cas, key, authority, environment, organization, list PKI PKI is based on standard protocol X.509 which defines the structure and content of certificates. PKI can be used … Read more Introduction to Public Key Infrastructure (PKI)

Examples of Cryptographic Attacks

Before you start Objectives: Learn about general cryptographic attacks, and how to deal with them. Prerequisites: no prerequisites. Key terms: attack, password, attacker, algorithm, hash, key, cryptographic, database, discover Password Attack Attacks related to passwords are often password cracking or password guessing. Attackers attempt to discover passwords by attempting reversed hash matching on stolen hashed passwords from databases. … Read more Examples of Cryptographic Attacks