Category Archives: Security Standardization and Practises
Survey of ISO certifications, results for 2015
ISO is having surveys about number of ISO certifications, it is worth to have a look 🙂 The table below is taken from the executive summary. There are also excel files available for each ISO standard that shows certifications per … Continue reading
Converting ISO 27002 into an excel and a graph
ISO 27002 “Code of practice for information security controls” list 144 controls with the same structure for all the controls. If one would like to work on these controls, like reusing them in another documentation or doing a presentation etc, … Continue reading
Process reference model (PRM) for ISMS (ISO 27001)
ISO TS 33052:2016 “Process reference model (PRM) for information security management” is in interesting document which can be useful when evaluating the possible ways to implement the information security management system (ISMS) processes (see ISO 27001 ISMS requirements). This Technical … Continue reading
Recommended Book: The Complete Book of Data Anonymization
I was getting started to search for information about data anonymization and preparing to took a time to do “yet another internet search” for information sources; until I happened to find this book. I was positively surprised that it did … Continue reading
Test: ONVIF IP Camera
ONVIF is recent standard for security IP cameras. Due to the standard, it should be easier to integrate these cameras into a surveillance solution. From ONVIF site: The ONVIF specification defines a common protocol for the exchange of information between … Continue reading
STIX, Structured Threat Information eXpression, by Mitre
Structured Threat Information eXpression STIX is a collaborative community-driven effort to define and develop a standardized language to represent structured cyber threat information. STIX Use Cases STIX sample This is from the training material. From samples page: STIX Tree Viewer … Continue reading
Indicators of Compromise, OpenIOC and CyBOX
Indicator of compromise IOC IOC in computer forensics is an artifact observed on a network or in operating system that with high confidence indicates a computer intrusion. Typical IOCs are virus signatures and IP addresses, MD5 hashes of malware files … Continue reading