Information security has become a bit of a cat-and-mouse game between network and server administrators and security managers on one side, and those with […]
Information Security
Information Security
Prompt: What principles should the information security analyst apply in order to develop appropriate password policies for their clients? Make sure you address confidentiality, integrity, and availability of […]
Information Security
Write a program (in any language you like) to help an analyst decrypt a simple substitution cipher. Your program should take the ciphertext as input, compute letter frequency counts, and […]
Information Security
– Analyse the problem and identify (users/roles/actors) – Identify primary use cases – Identify assets, Vulnerabilities and threats
Information Security
Why is information security more than technology? How to design and implement a successful information security system.