Skip to main content

Posts

Showing posts from 2022

The Different Types of Cybersecurity

  Cyber security is a wide field covering several disciplines. It can be divided into seven main pillars:    1. Network Security Most attacks occur over the network, and network security solutions are designed to identify and block these attacks. These solutions include data and access controls such as Data Loss Prevention (DLP), IAM (Identity Access Management), NAC (Network Access Control), and NGFW (Next-Generation Firewall) application controls to enforce safe web use policies. Advanced and multi-layered network threat prevention technologies include IPS (Intrusion Prevention System), NGAV (Next-Gen Antivirus), Sandboxing, and CDR (Content Disarm and Reconstruction). Also important are network analytics, threat hunting, and automated SOAR (Security Orchestration and Response) technologies.       2. Cloud Security As organizations increasingly adopt cloud computing, securing the cloud becomes a major priority. A cloud security strateg...

PCI DSS Compliance

  The PCI Digital Security Standard (PCI DSS) is a set of internationally-recognized security standards that exist to protect the sensitive data associated with payment accounts. These standards apply to any organization or other entity that manages cardholder data. As of March 2022, PCI DSS v4.0 is the most current version of these standards, though v3.2.1 will remain valid until the end of March 2024. PCI DSS defines 12 requirements, testing procedures for each requirement and guidance on best practices for implementation.  To be PCI compliant, an organization must implement and maintain security practices that meet or exceed these standards.  Why is PCI Compliance Important? Whether you're a large or small business, if you are a merchant who accepts credit card payments, or are a service provider to merchants, your organization is responsible and must protect payment cardholder data through PCI security standards and PCI services. With security breaches and cyber...

What's the difference between two-step verification and 2FA?

  The two terms, two-step verification, and two-factor authentication are synonymous, though the former is now being used more widely by the likes of Google, Microsoft, and Apple as it better conveys how the actual authentication process works. In the past, two-step verification was used to describe processes that used the same authentication factors, while two-factor authentication described processes that involved different factors, such as entering a password on a website and receiving a numerical code on a mobile device. Today, the two terms are both used to describe authentication that involves a secondary factor that is different from the first. Authentication is a vital element of access control and data security because users can be assigned access rights and be authorized to perform certain actions only after successful authentication is performed. The ways in which someone can be authenticated fall into three categories based on what is known ...

What is narrow AI and what is weak AI?

Narrow AI, Also known as weak AI, is an application of artificial intelligence technologies to enable a high-functioning system that replicates and perhaps surpasses human intelligence for a dedicated purpose.  Narrow AI is often contrasted with general artificial intelligence (AGI), sometimes called strong AI; a theoretical AI system that could be applied to any task or problem. Examples of narrow AI All forms of modern AI systems can be classified as narrow AI. They are as follows: All forms of modern AI systems can be classified as narrow AI. They are as follows: Image and facial recognition systems.  These systems, including those used by social media companies like Facebook and Google to automatically identify people in photographs, are forms of weak AI. Chatbots and conversational assistants.  This includes popular virtual assistants Google Assistant, Siri, and Alexa. Also included are simpler, customer-service chatbots, such as a bot that assists custo...

What is an exabyte?

  An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes. The prefix exa means one billion billion, or one quintillion, which is a decimal term. Two to the sixtieth power is actually 1,152,921,504,606,846,976 bytes in decimal, or somewhat over a quintillion (or 10 to the eighteenth power) bytes. However, it is common to say that an exabyte is approximately one quintillion bytes or 1,000,000,000,000,000,000 bytes. In decimal terms, an exabyte is a billion gigabytes (GB). Exabytes are a unit of digital storage that is made up of bytes. A byte is comprised of eight bits. A bit is a single unit of data. An exabyte is about the amount of digital information created on the internet each day in 2012. The total data created every day in 2020 is estimated to be 2.5 EB, according to Finances Online. And all the words ever spoken by human beings are said to be 5 EB. How does an exabyte compare to other dat...

What is RAID 10

  RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data. It requires a minimum of four disks and stripes of data across mirrored pairs. As long as one disk in each mirrored pair is functional, data can be retrieved. If two disks in the same mirrored pair fail, all data will be lost because there is no parity in the striped sets. RAID, which stands for redundant array of independent disks, comes in several different configurations. A RAID 1 configuration copies data from one drive to another, mirroring and duplicating data to provide improved fault tolerance and data protection. Data is fully protected as the mirror copy is available if the originating drive is disabled or unavailable. Because it makes a full duplicate of the data, RAID 1 requires twice as much storage capacity as the original data. RAID 0 doesn't provide any data protection; its sole purpose is ...