Mindblown: a blog about philosophy.
How often we develop poorly but try to secure the application at the perimeter level? Is this even possible? Regardless of the whatever the methodologies being applied for SDLC; there are certain things the team must focus on enforcing the cyber security. Whether you are on Agile, Waterfall or CICD; these “things” must not e […]
Install and configure network components, both hardware and software-based, to support organizational security. Firewall / UTM NIDS / NIPS VPN Concentrator Firewalls Isolate one network from another A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules […]
Install and configure network components,both hardware and software-based, to support organizational security Router Switch Bridge Proxy Load Balancer Firewall NIDS / NIPS VPN Concentrator Wireless Access Points SIEM DLP NAC SSL / TLS accelerators Mail / Media Gateway Hardware Security Models Router Connects computer networks Operate at Layer 3 (Network Layer) Stores information about network […]
Got any book recommendations?