Internet Security – Phishing
Many of us have received similar emails as shown in the following screenshot. They appear as if coming from a genuine source, but in fact if we analyze them a…
Many of us have received similar emails as shown in the following screenshot. They appear as if coming from a genuine source, but in fact if we analyze them a…
In this section we will explain some important compliances that are around the technology industry. Nowadays technology compliance is becoming more important because it is developing too fast and legal…
In this chapter, we will discuss on an advanced checklist that we will use in order to educate users and IT staff too, when it comes to any security issues,…
In this chapter we will explain security policies which are the basis of security for the technology infrastructure of your company. In a way they are the regulatory of the…
In this chapter we will discuss regarding the network from the view of security. We will also look into which are the systems that help us as system administrators to…
Disaster recovery is generally a planning process and it produces a document which ensures businesses to solve critical events that affect their activities. Such events can be a natural disaster…
In this Chapter, we will discuss backups which is a process of saving data that can be over a network or a computer. Why is Backup Needed? The main purpose…
In this chapter, we will discuss about the how important Encryption is for Computer Security. What is Encryption? Encryption is a transformed type of genuine information where only the authorized…
In the previous chapter we treated antiviruses which helped us to protect our systems but in this chapter we will treat malwares, how to detect them manually, what are their…
In the previous chapter, we saw how to secure our computers and one of the points was installing and updating antivirus software. Without this software there is a high chance…