icranium | security

japanese-garden-philosophy

A moment of reflection: FREE articles & tutorials

Here you can find * FREE * information concerning a wide range of topics. Just take a look and grab the free tutorials and learn all about Hacking, Web Application Security, Windows Platform Security, Active Directory, Programming, Security Architecture, Cyber Security Strategy and a lot   … more

Himeji-Castle-Japan

Information Security Architecture

Defense in depth is a military strategy; it seeks to delay rather than prevent the advance of an attacker. Rather than defeating an attacker with a single, strong defensive line, defense in depth relies on the tendency of an attack to lose momentum over a period of time or as it covers a larger area. The idea of defense in depth is now widely used to describe multi-layered or redundant … more

5

Defend yourself: change is necessary

Cybersecurity requires effective measures. In a broad sense, organizations protect themselves and take concrete steps to get the appropriate response. But how? It is important to fall back on a reference model. Each cyber attack follows a pattern which is described as the "kill chain". This chain ¹ of events exists about six stages through which an attacker works. Only the last stage - Stage 6 … more

3

Deterrence

More focus on real time analysis in coming years. In a recent ESG - Enterprise Strategy Group IT market research reports, enterprise security professionals were asked to identify the primary objectives associated with their organization's network security strategy. It turns out that 40% of organizations plan to move toward continuous monitoring of all assets on the network, while 30% plan to … more

2

Countermeasure

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Duis convallis blandit erat, at fermentum orci tincidunt quis. Proin metus mi, rutrum quis nulla at, dignissim condimentum enim. Suspendisse potenti. Sed porttitor, turpis id posuere adipiscing, ante enim iaculis leo, sed aliquam erat eros a lorem. Vivamus cursus bibendum imperdiet. Vestibulum faucibus a ante non pretium. Nam blandit viverra … more

odawara mon

Resemblance with IT Security

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Duis convallis blandit erat, at fermentum orci tincidunt quis. Proin metus mi, rutrum quis nulla at, dignissim condimentum enim. Suspendisse potenti. Sed porttitor, turpis id posuere adipiscing, ante enim iaculis leo, sed aliquam erat eros a lorem. Vivamus cursus bibendum imperdiet. Vestibulum faucibus a ante non pretium. Nam blandit viverra … more