Posts tagged with Archive

There are 477 posts tagged. These could be essays, tumblelog entries, or other types of content.

Cybersecurity Basics #10 - Personally Identifiable Information

Personally identifiable information (PII) and Personal Health Information (PHI) are critical concepts. They help identify information that needs additional safeguards and care.

Read more...

Cybersecurity Basics #9 - Attack Attribution

Who did it? It's a powerful question and the answer to "What is attack attribution?"

Read more...

Cybersecurity Basics #8 - Authentication, Authorization, & Need To Know

Authentication and authorization are two critical concepts that are intertwined. Understanding the difference and their purpose is key to understanding cybersecurity.

Read more...

Cybersecurity Basics #7 - Hackers & Cybercriminals

Hackers and cybercriminals are all "malicious actors". While you may not know who is attacking a system, having a better understanding of common motivations is important.

Read more...

Cybersecurity Basics #6 - Malware

Malicious software (malware) is an umbrella term that covers a number of different types of software designed to do bad things...but those specific categories don't mean to much day-to-day when it comes to defence...

Read more...

Cybersecurity Basics #5 - Encryption

Encryption: what is it? why does it work?

Read more...

VPNs

VPNs can help secure your internet traffic when you're travelling. They can help you route around geographic restrictions. But is using a VPN exposing you to more risk? What is the impact of centralizing all of your internet requests with one specific company?

Read more...

Cybersecurity Basics #4 - Perspective

Perspective is a tricky thing...maybe the hardest aspect of cybersecurity

Read more...