Information Security Resources

Entries for the ‘General Information Security’ Category

Free Antivirus Vs Full Product Antivirus Programs. Are They Safe To Use?

I have always been interested in trying new software for just about every application you can imagine. I have also always been a big fan of free programs. There are a lot of free programs with varied applications but for now we will focus on only antivirus programs. I have tried them all over the […]

Comments (4)

Escorcher — Adware And Spyware Rolled Into One

I’m going to share an unpleasant experience with you today. I downloaded and installed what I thought was a free antivirus, but turned out to be an adware and spyware program. To make sure we are clear about what I’m talking about I’m going to take a moment and share with you the definitions of […]

Comments (1)

Is Xpassmanager Adware?

Adware is never something that you want on your computer. It often gets confused with cookies. Xpassmanager isn’t a cookie; it’s the worst kind of adware you can get. If someone tells you that adware can be useful, they must be internet marketers. If you think that you have accidentally gotten the Xpassmanager file on […]

Comments (1)

Enconfidence – Beware Of This Adware

I have a tale to share. This is the tale of how I got infected with the enConfidence adware. I saw a free program that I thought would be great, My Daily Horoscope, and paid dearly for it. After I downloaded and installed My Daily Horoscope I found the Begin2Search toolbar was also installed at […]

Leave a Comment

Transmission Control Protocol (Tcp)

Transmission Control Protocol (TCP)  Today, the majority of application protocols use the Internet’s reliable Transmission Control Protocol (TCP). The functionality of TCP  is designed to be adequate not only for Internet applications but also for the variety of underlying networks.            The protocol aims at providing a reliable service with the following features:        1. Fairness […]

Leave a Comment

Deltaprima – Konsultan Manajemen Keamanan Informasi, It Security, Iso 27000 – Iso 27001 Consultant, Business Continuity, Bcp Drp, Disaster Recovery

ISO IEC 27001 International Standard covers all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations). This International Standard specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented ISMS within the context of the organization’s overall business risks. It specifies requirements for the implementation of security controls customized to […]

Leave a Comment

Aligning Employee Attitudes with Security Policies

Don’t overlook your employees’ rejection of your security policies. Without their understanding and acceptance, your company’s information security is at stake. Here is a very good article why we should and how we can enforce security policies in a corporate environment: As we have discussed before in this blog, the point is that you […]

Leave a Comment

Being Humble: The right mind set for Corporate Governance and IT Governance

For every first lesson I teach about Risk Management and Contingency Planning, I always like to raise an example to begin a discussion about the illusions of human beings. This illusion is best illustrated by an interesting game called the Monty Hall Problem, which goes like this: Suppose you are a lucky game show player […]

Leave a Comment

Security Issue with Google Browser Chrome: How to Handle

I read a piece of news about the security issue of the new Google Browser Chrome from ComputerWorld. The Google Browser is an open source project, and many of the components it was built on use open source software. One of them is the open-source rendering software called WebKit. This component was found to have […]

Comments (1)

What is Risk, Vulnerabilities, Threats, and Countermeasures: Risk Management Lesson 101 for Information Security

In this article, I will use layman’s terms and descriptions to help you understand the various fundamental concepts of Risk Management in Information Security. To illustrate those concepts, I like to use a popular diagram1 from Common Criteria, shown below: In the center of this diagram you’ll find the term vulnerabilities. Vulnerabilities are any weaknesses […]

Leave a Comment