Author Archives: Admin
Security laws and regulations directory
CSO Online article “The security laws, regulations and guidelines directory” contains a good list in this subject. This list is a good starting point when looking which laws and regulation there exist. Broadly applicable laws and regulations Industry-specific guidelines and … Continue reading
Another Security Vocabulary bt IETF
There exist another vocabulary called “Internet Security Glossary, Version 2”. It is IETF RFC 4949 from 2007. IETF=Internet Engineering Task Force Note, in RFC 4949 the definitions might differ from the ITU and ISO definitions. For example, “information security” is … Continue reading
ITU Terms and Definitions
ITU (International Telecommunication Union, intro) has online database for terms and definitions for 6 languages. Currently there are more than 100000 terms. For the term “information security” it can find a match in ITU-T. Term : information security Definition … Continue reading
ISO Standards, Risk Management and Information Security Vocabularies
There are different vocabularies for Information Security. One good reference Risk Management is the ISO Guide 73 from 2009. For Information Security, one should look ISO 27000 from 2009. Unfortunately these standards are not free. For free vocabulary, it is … Continue reading
ITIL support material
The following 3 books (free) are supportive material. Worth to have. An Introductory Overview of ITIL® V3 Glossary of Terms and Definitions Acronyms
HMG IA Standard No.1 – Technical Risk Assessment (2009)
There exist several Risk Assessment methods in addition to related ISO standards. This one from UK goverment contains also a worked example. It is worth to have a quick look. Document “HMG IA Standard No.1 – Technical Risk Assessment – … Continue reading
Security Challenges and Competitions
There exist some security related competitions, which might be interesting for some people. Have a look at Cyber Security Challenge UK web page. One of the links are to Digital Forensics Challenge 2011 by DC3 (DoD Cyber Crime center). It … Continue reading