Information system security wk4-cryptography-2Bee Lalita
The document is about cryptography and contains the following key points:
1. It discusses symmetric key cryptography and asymmetric key cryptography (public key cryptography). Symmetric key cryptography uses the same key for encryption and decryption while asymmetric key cryptography uses different keys.
2. It describes stream ciphers and block ciphers as two types of symmetric key cryptography. Stream ciphers encrypt data bit-by-bit using a pseudorandom keystream while block ciphers encrypt fixed-size blocks. RC4 is provided as an example of a stream cipher.
3. It also covers the RSA public key cryptosystem, explaining how it uses prime factorisation and modular arithmetic to encrypt with a public key and decrypt with a
This document provides an overview of firewall types and how they function. It discusses the OSI and TCP/IP models and how packets are encapsulated and transmitted. It then describes three main types of firewalls: packet filtering firewalls which filter packets based on headers only; stateful inspection firewalls which track connection state; and application layer firewalls which use proxies to handle application data and connections. The document provides examples and diagrams to illustrate how each firewall type works.
This document discusses the importance of continuous IT security awareness programs for organizations. It recommends conducting regular security awareness activities on a weekly, quarterly, and annual basis using different communication channels to effectively reach all employees. Example content includes topics like passwords, malware, social engineering, and data privacy. The goal should be to measure improvements in security knowledge and behaviors over time through ongoing training, communications, and mock cybersecurity incidents. Effective awareness programs treat security as a long-term effort and priority for the entire organization.
This document discusses various topics related to backup and recovery of computer systems, including common threats to systems, types of viruses, importance of regular backups, different backup strategies and methods, and ensuring continuity of service. It provides details on full, incremental, and differential backups and recommends backing up data regularly to external storage drives or online backup services. The document stresses having clear backup procedures, assigning responsibility, and being prepared to recover from data loss through training and alternative plans.
This document discusses best practices for backup and recovery planning. It covers common backup and recovery topics like different backup methods and topologies, the backup process, and managing backups. It also provides an overview of a typical backup application and the importance of backup reports and catalogs. The document is made up of multiple lessons intended to describe backup and recovery concepts and considerations.
An Introduction to Disaster Recovery PlanningNEBizRecovery
This document provides an introduction to disaster recovery planning for businesses. It explains that a disaster recovery plan helps businesses anticipate, address, and mitigate the effects of a business disruption or disaster to return to normal operations. The plan has two main components: an emergency response plan to address immediate response, and a business continuity plan to address short and long-term continued performance of essential functions. Developing a disaster recovery plan can help reduce disruption, minimize chaos during an event, and protect a business, with the goal of keeping the business operational through a disaster.
The document provides an overview of database backup, restore, and recovery. It describes various types of failures that may occur including statement failures, user process failures, instance failures, media failures, and user errors. It emphasizes the importance of defining a backup and recovery strategy that considers business requirements, operational requirements, technical considerations, and disaster recovery issues to minimize data loss and downtime in the event of failures.
Information system security wk4-cryptography-2Bee Lalita
The document is about cryptography and contains the following key points:
1. It discusses symmetric key cryptography and asymmetric key cryptography (public key cryptography). Symmetric key cryptography uses the same key for encryption and decryption while asymmetric key cryptography uses different keys.
2. It describes stream ciphers and block ciphers as two types of symmetric key cryptography. Stream ciphers encrypt data bit-by-bit using a pseudorandom keystream while block ciphers encrypt fixed-size blocks. RC4 is provided as an example of a stream cipher.
3. It also covers the RSA public key cryptosystem, explaining how it uses prime factorisation and modular arithmetic to encrypt with a public key and decrypt with a
This document provides an overview of firewall types and how they function. It discusses the OSI and TCP/IP models and how packets are encapsulated and transmitted. It then describes three main types of firewalls: packet filtering firewalls which filter packets based on headers only; stateful inspection firewalls which track connection state; and application layer firewalls which use proxies to handle application data and connections. The document provides examples and diagrams to illustrate how each firewall type works.
This document discusses the importance of continuous IT security awareness programs for organizations. It recommends conducting regular security awareness activities on a weekly, quarterly, and annual basis using different communication channels to effectively reach all employees. Example content includes topics like passwords, malware, social engineering, and data privacy. The goal should be to measure improvements in security knowledge and behaviors over time through ongoing training, communications, and mock cybersecurity incidents. Effective awareness programs treat security as a long-term effort and priority for the entire organization.
This document discusses various topics related to backup and recovery of computer systems, including common threats to systems, types of viruses, importance of regular backups, different backup strategies and methods, and ensuring continuity of service. It provides details on full, incremental, and differential backups and recommends backing up data regularly to external storage drives or online backup services. The document stresses having clear backup procedures, assigning responsibility, and being prepared to recover from data loss through training and alternative plans.
This document discusses best practices for backup and recovery planning. It covers common backup and recovery topics like different backup methods and topologies, the backup process, and managing backups. It also provides an overview of a typical backup application and the importance of backup reports and catalogs. The document is made up of multiple lessons intended to describe backup and recovery concepts and considerations.
An Introduction to Disaster Recovery PlanningNEBizRecovery
This document provides an introduction to disaster recovery planning for businesses. It explains that a disaster recovery plan helps businesses anticipate, address, and mitigate the effects of a business disruption or disaster to return to normal operations. The plan has two main components: an emergency response plan to address immediate response, and a business continuity plan to address short and long-term continued performance of essential functions. Developing a disaster recovery plan can help reduce disruption, minimize chaos during an event, and protect a business, with the goal of keeping the business operational through a disaster.
The document provides an overview of database backup, restore, and recovery. It describes various types of failures that may occur including statement failures, user process failures, instance failures, media failures, and user errors. It emphasizes the importance of defining a backup and recovery strategy that considers business requirements, operational requirements, technical considerations, and disaster recovery issues to minimize data loss and downtime in the event of failures.
Intelligence Guaranteed Development: The New Paradigm Enabled by Open Source ...Luesak Chakrabandhu
Intelligence Guaranteed Development: The New Paradigm Enabled by Open Source Software จะช่วยอธิบายให้องค์กรเข้าใจว่าทำไมจึงควรออกแบบและพัฒนาการวิเคราะห์ข้อมูลและรายงานอย่างละเอียดก่อนที่จะลงทุนพัฒนาระบบ Application Software ไปโดยยอมรับความเสี่ยงที่จะเกิดข้อจำกัดในการนำข้อมูลมาใช้ประโยชน์ในทั้งในระยะสั้นและระยะยาวด้วยการยอมเสียเงินเสียเวลากับ IT Project ไปก่อน แล้ว "ไปตายเอาดาบหน้า" ว่าจะมีข้อมูลที่นำมาใช้ในกระบวนการสร้าง Business Intelligence ได้หรือไม่
Service offering for tech Startup In thailand - Infrastructure as a service.Udomsak Chundang
This document discusses starting a tech startup and getting help from experts. It introduces a team called the UNIXDEV Team that can help with excellent engineering and system integration. They provide server hosting, cloud deployment, security services, and IT consulting to help startups focus on their product while the experts handle the infrastructure. Their goal is to work with startups and grow together towards success.
TOT offers cloud computing services through its Internet Data Center (IDC). The IDC utilizes virtualization technology and provides Infrastructure as a Service, Platform as a Service, and Software as a Service. It aims to support 1,200,000 fixed broadband customers and 500,000 FTTx customers by 2025. The IDC follows ISO27001 standards for information security and provides backup, monitoring, disaster recovery and other support services to ensure high service levels.
TRUE IDC provides various information and communication technology services including internet data center services, co-location services, dedicated server services, web hosting services, and value added services such as storage and backup. TRUE IDC also offers TRUE Cloud Service including infrastructure as a service through their public and private clouds. Their cloud services target small and medium enterprises, developers, and resellers. TRUE IDC utilizes technology from XEN and offers self-management through a web portal.
Anise Asia provides a cloud management software called SmartDataCenter that can integrate public, private, and hybrid clouds from various vendors. SmartDataCenter supports both application development platforms and common databases. It offers features like auto-scaling, high availability, and a customer portal for provisioning and monitoring resources.
1. การใช้ IT ในงานภัยพิบัติ ศูนย์คอมพิวเตอร์ ส่วนงานกลาง By: udomsak@nstda.or.th
2.
3. „ The Sahana Software Foundation is dedicated to the mission of saving lives by providing information management solutions that enable organizations and communities to better prepare for and respond to disasters. „