Profile cover photo
Profile photo
w3nest
4 followers -
Your One-Stop-Shop for Domain Name Registration & Hosting Services
Your One-Stop-Shop for Domain Name Registration & Hosting Services

4 followers
About
w3nest's posts

Post has attachment
Public
Malicious Software Removal Tool
Microsoft Windows Malicious Software Removal Tool is a freely distributed virus removal tool developed by Microsoft for the Microsoft Windows operating system. First released on January 13, 2005, it is an on-demand anti-virus tool ("on-demand" means it lack...

Post has attachment
Public
Security governance
The Software Engineering Institute at Carnegie Mellon University, in a publication titled "Governing for Enterprise Security (GES)", defines characteristics of effective security governance. These include: An enterprise-wide issue Leaders are accountable Vi...

Post has attachment
Public
Information security culture
Employee’s behavior has a big impact to information security in organizations. Cultural concept can help different segments of the organization to concern about the information security within the organization.″Exploring the Relationship between Organizatio...

Post has attachment
Public
Sources of standards
International Organization for Standardization (ISO) is a consortium of national standards institutes from 157 countries, coordinated through a secretariat in Geneva, Switzerland. ISO is the world's largest developer of standards. ISO 15443: "Information te...

Post has attachment
Public
Cryptography
Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption. Information that has been encrypted (rendered unusable) can be transforme...

Post has attachment
Public
Risk management
The Certified Information Systems Auditor (CISA) Review Manual 2006 provides the following definition of risk management: "Risk management is the process of identifying vulnerabilities and threats to the information resources used by an organization in achi...

Post has attachment
Public
Non-repudiation
In law, non-repudiation implies one's intention to fulfill their obligations to a contract. It also implies that one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction. It is important to ...

Post has attachment
Public
Integrity
In information security, data integrity means maintaining and assuring the accuracy and completeness of data over its entire life-cycle.This means that data cannot be modified in an unauthorized or undetected manner. This is not the same thing as referentia...

Post has attachment
Public
Confidentiality,information security
In information security, confidentiality "is the property, that information is not made available or disclosed to unauthorized individuals, entities, or processes" (Except ISO27000).

Post has attachment
Photo identification,photo ID
Photo identification or photo ID is an identity document that includes a photograph of the holder, usually only his or her face. The most commonly accepted forms of photo ID are those issued by government authorities, such as driver's licenses, identity car...
Wait while more posts are being loaded