BestInternetSecurity.net

Information Security Resources

Entries for the ‘Operations Security’ Category

How to Use TrueCrypt (USB Data Encryption) on a Computer without Administrative Rights

Referring to my post about TrueCrypt, I mentioned a disadvantage of using this software — you cannot use it on a computer without administrative rights. Actually, there is a third-party GUI interface program that can be run on a computer without administrator rights, and you are still able to access the container file of TrueCrypt [...]

Comments (1)

USB Data Encryption and Decryption on a Computer without Administrator Rights?

As I promised in the post about a data encryption utility called TrueCrypt, I am going to show you another utility that can be used to encrypt portable data on a USB drive. Unlike TrueCrypt, in which you must have administrative rights to activate the program for accessing the encrypted data, this program allows you [...]

Comments (1)

How to Keep your Portable Data from Being Stolen

Do you worry about your data from being stolen if you lost your USB thumb drive or other portable data storage? Here is a free solution. Try TrueCrypt. TrueCrypt is an open sourced project providing a simple solution to encrypt your USB data (or actually data in any other movable or internal storage of your [...]

Comments (2)

Anti Spam Filtering Using Gmail

Anti Spam Filtering using Gmail? Why? I have been using Gmail, Yahoo! Mail, and Hotmail for very long time. My general feeling is that the super-powerful anti spam filtering capability of Gmail is unprecedented. It can eliminate almost 98% of spam emails while at the same time maintaining an almost zero error rate of filtering [...]

Leave a Comment

Operations Security: Audit and Accountability

The accountability portion of security control refers to holding system users responsible for their actions by constantly monitoring all activities within the system. Consistently logging and auditing activities are ways that we monitor the system to ensure proper tracking of computer misuse. For example, as part of the auditing process, the following activities should be [...]

Leave a Comment

Operations Control Techniques

Now we’ll cover some of the administrative aspects of Operations Control. Separation of Duties is a preventative measure that prevents one person from performing a full function from beginning to an end. This policy reduces the possibility of any one person committing an act against policy unless there is collusion amongst two or more people. [...]

Leave a Comment

Operations Security (OPSEC)

Before we can fully understand operations security, let’s define what we mean by “operations.” Operations refer to the continual, day-to-day usage and maintenance of the system. Operations Security covers all the measures necessary to keep the entire system— including the network, computer system(s), and applications—running in a secure and protected manner. Operations Security includes the [...]

Leave a Comment