Auditing for Security

INTRODUCTION Today we have methods to make it possible to audit systems, which can be used for good or for the worse, and it is something that can be achieved through external or third-party systems, or it can be implemented with some methodology and techniques which allows the investigation and analysis of events which occurredContinue reading “Auditing for Security”

Electronic Monitoring

INTRODUCTION In spite of the electronic devices such as cameras, fingerprints and identity cards, for instance being used by the police in the past in regards to criminal situations, today is very and very more often that this devices are developed by the industry to help companies on achieving their goals, being possibly regarding policiesContinue reading “Electronic Monitoring”

Personal Information and Privacy on the Internet today

INTRODUCTION The main objective of this small article is to give my point of view on internet privacy and stolen information. PERSONAL DATA AND INFORMATION This is not new for a computer professional that conversations and information can be stolen on many ways which may be using technical flaws, the insecurity of the internet protocols,Continue reading “Personal Information and Privacy on the Internet today”

Network Hacking

Network Hacking is a very common topic nowadays, and it has been one of the most important topics in computer science since the early years of connectivity and the wide spread of computers and networks. A very simple definition for a hacker is given as “In computer networking, hacking is any technical effort to manipulateContinue reading “Network Hacking”

Target Security Breach in 2013

Introduction The main point to be covered in this discussion is the Target Corporation security breach that took place in 2013, which affected customers who swiped their credit and debit cards between Nov. 27/2013 and Dec. 15/2013, and became a very important topic in network security. This security issue was announced via a report writtenContinue reading “Target Security Breach in 2013”