Technical Reports from ITU-T’s Cloud Computing Focus Group are available

The work done by Focus Group Cloud (ITU-T) is now available as Technical Reports.

FG Cloud has been finished, and further work will take place in Study Groups…

FC-cloud2

 

This is interesting for anyone working in the area. The downloadable file contains 7 reports:

  • Part 1: Introduction to the cloud ecosystem: definitions, taxonomies, use cases and high-level requirements
  • Part 2: Functional requirements and reference architecture
  • Part 3: Requirements and framework architecture of cloud infrastructure
  • Part 4: Cloud Resource Management Gap Analysis
  • Part 5: Cloud security
  • Part 6: Overview of SDOs involved in cloud computing
  • Part 7: Cloud computing benefits from telecommunication and ICT perspective
Posted in Cloud Computing, Cloud Security, Cloud Standards, ITU-T, Security Standardization and Practises, Telecom Security | Comments Off on Technical Reports from ITU-T’s Cloud Computing Focus Group are available

Booklet “EU surveillance”

EDR (European Digital Rights) has published an interesting paper called “EU Surveillance

EDR: European Digital Rights was founded in June 2002. Currently 28 privacy and civil rights organisations have EDRI membership. Members of European Digital Rights have joined forces to defend civil rights in the information society.

What is this booklet about? It is well defined in the introduction:

The purpose of this booklet is to briefly outline current EU surveillance and security measures in order to give an insight into their scale and cumulative effect.

The material is divided into following subjects:

  • data retention
  • passenger name record
  • europol’s intelligence files
  • financial records
  • surveillance subsidies
  • smart meters
  • biometric data
  • principle of availability
  • body scans
  • nothing to hide, nothing to fear?
Posted in Privacy, Security Training, Awareness and Reports | Comments Off on Booklet “EU surveillance”

Booklet “How the internet works”

EDR (European Digital Rights) has published nicely simplified explanation “How the internet works”.

EDR: European Digital Rights was founded in June 2002. Currently 28 privacy and civil rights organisations have EDRI membership. Members of European Digital Rights have joined forces to defend civil rights in the information society.

In the introduction, it states the approach:

This booklet is intended to provide policy-makers with a basic overview of Internet and Internet-related technologies. The aim is to provide a user-friendly reference guide…

I think this booklet achieved it’s goal. Worth to have a look. Each of the following subjects is briefly explained…

  • the internet
  • the ip-address
  • encryption
  • the domain name system (dns)
  • the world wide web
  • e-mail and e-mail security
  • deep packet inspection
  • peer-to-peer
  • behavioural advertising
  • the search engine
  • cloud computing
  • social media
  • internet governance
Posted in ICT Terminology, ICT Training and Courses, Security Terminology | Comments Off on Booklet “How the internet works”

ixquick, For searching internet with better privacy

ixquick

ixquick is a metasearch engine which uses other search engines.

The good side of ixquick is privacy. In their privacy policy, it is stated

  • The IP address that is associated with your search will NOT be recorded.

Please note that ixquick has received European Privacy Seal in recognition of it privacy protection.

Tip

One can add ixquick to firefox search engine list via this page.

Tip

There is another site https://startpage.com, which is ixquick, but using google as search engine.

Posted in Basic Tools, Privacy, Tips | Comments Off on ixquick, For searching internet with better privacy

Big privacy concern for andoid users

The new privacy policy by Google clearly states that they can and will records your activities on your android device. They can log:

  • Device information
  • your search queries
  • telephony log information
    • your phone number
    • calling-party number
    • forwarding numbers
    • time and date of calls
    • duration of calls …
  • system activity, hardware settings, browser type, browser language…
  • the date and time of your request and referral URL
  • Location information

One can read the storyline via PC-Magazine

There is even one law suit from android user.

Posted in ICT News, Privacy, Telecom Security | Comments Off on Big privacy concern for andoid users

Security Awareness for Teens, by ISECOM

The security and privacy awareness program developed by ISECOM contains 12 lessons teaching material.

  • Lesson 01 – Being a Hacker
  • Lesson 02 – Windows and Linux
  • Lesson 03 – Ports and Protocols
  • Lesson 04 – Services and Connections
  • Lesson 05 – System Identification
  • Lesson 06 – Malware (Viruses, Trojans, etc.)
  • Lesson 07 – Attack Analysis
  • Lesson 08 – Digital Forensics
  • Lesson 09 – E-mail Security and Privacy
  • Lesson 10 – Web Security and Privacy
  • Lesson 11 – Passwords
  • Lesson 12 – Internet Legalities and Ethics

The target group is elementary, junior high, and high school students, but material is suitable for anyone else as well.

I do not like the HHS title “Hacker Highschool”. However, the material starts well by explaining what this is all about and how security skills can be used for good (and why, of course).

As a summary, the material can be seen as basic security skills training material. The kind of information and skills that one can expect from security aware people, exactly as the aim of the training is: awareness.

Posted in Security Training, Awareness and Reports | Comments Off on Security Awareness for Teens, by ISECOM

Communications protocols and their samples

This blog aims to provide some good links to several communications protocols.

Basic information sources

Posters

Samples

Wireshark is THE tool, see blog. The following pcap samples are available:

Commercial Posters

Javvin offers several posters.

Posted in ICT Training and Courses, Tips | Comments Off on Communications protocols and their samples