CATEGORY: Cybersecurity and
2.2 – Account Accessibility
Identification The identification procedure collects information about who applied for access. This procedure is generally used by the unique machine-readable names. Based on this system, authentications are validated, enabling access. In terms of humans, users and resources connect in mutual identification when they apply for access permission. For example, during phone calls, people tell others […]
2.1 – Account Administration
Creating a new user is a simple procedure, but it must be secured and protected with organizational security policy procedures. User accounts should not be created at anyone’s request or urge of an admin. Rather, a strict process should be followed that flows from the HR department hiring process. The formal request for a new […]
2.0 – Access Control Techniques
The basic construct in the establishment of information security regime is regulating how resources which are to be accessed will be protected against network vulnerabilities. The control mechanisms deployed vary in nature, and could be administrative, physical or technical. Access Control is a security method which is being used to grant access and certain authority […]
1.3 – Number Systems
Binary number system: Binary number system is a numbering system in which there are only two possible values for each digit: 0 and 1. This also refers to any digital encoding/decoding system in which there are accurately two possible values. In digital data memory, processing, storage and communications, the 0 and 1 values are sometimes called […]
1.2 – Fundamentals of Internet
In 1957, the Soviets successfully launched Sputnik and that feat began the space race. It also helped in bringing about the Internet. In part because of Sputnik, the ARPA (Advanced Research Projects Agency) was created by the U.S department of Defense, also in 1957. Among others, ARPA formed research centers at many U.S. universities. It […]






