Posts

Showing posts from 2019

cryptography and encryption

there are two main types of Encryption  Symmetric encryption AES128 or higher must be used AES256 must be used with external cloud service providers Other algorithms must not be used Asymmetric encryption RSA with a minimum key length of 2048 must be used The DH key exchange protocol should be used where appropriate for key exchange and must use a minimum key size of 2048 Private keys must be subject to periodic review to identify compromise Other Asymmetric Encryption must not be used Hash functions SHA-2 with a digest value of 256 or higher should be used SHA-3 may be used in place of SHA-2 MD5, SHA-1 must not be used except for file validation Other algorithms not listed must not be used Cryptographic salt should be used in combination with all implementations of hash functions except for file validation Cipher suites for SSL/TLS EECDH+AESGCM EDH+AESGCM AES256+EECDH AES256+EDH TLS v1.1 may be used to support legacy implementations TLS v1.2 shou...

Digital Technology Disadvantages

how much offensive digitization for commerce and   peoples Data Security Crime and Terrorism Complexity Privacy Concerns Social Disconnect Work Overload Digital Media Manipulation Job Insecurity Plagiarism and Copyright Anonymity and Fake Personas Over-reliance on Gadgets Addiction Second-hand Living Organization and Storage Depersonalized Warfare Longevity Social Denationalization 17. Social Depersonalization Society continues to become more and more depersonalized as digitized machines replace humans. People shop online, do their banking online, pay bills online, and increasingly work online. Transport is also set to become automated, which will result in taxis and delivery vehicles being driver free.

The 6 Highest-Paid Cyber security Jobs

PASS SECURITY CLEARANCES (IF APPLICABLE) Security clearances are necessary for those who wish to work with classified information as part of a military of government agency. A variety of agencies issue both personnel and facility security clearances, but most are issued by the Department of Defense. Each type of clearance has its own procedures and paperwork. The process, which takes three months to a year, does not begin until an employer decides to hire you, at which point you receive a conditional offer of employment. The first step is to submit clearance documentation, followed by a Background Investigation. The 6 Highest-Paid Cybersecurity Jobs: Application Security Engineer:  This cybersecurity role tops the list with an average salary range that falls between $100,000 to $210,000, according to our  2017 Salary Outlook  guide. However, our most recent 2017 placement data shows that Senior or Lead-level roles are pushing past ...

images related cyber

Image

future scope of cyber

A cyber security analyst helps in planning, implementing and upgrading security measures and controls. They continuously monitor security access and perform internal and external security audits to ensure there are no loopholes or evidence of security lapses. A cyber security analyst is also responsible for conducting vulnerability testing, risk analyses, and security assessments, and for managing the network. In addition to these tasks, the analyst trains fellow employees in security awareness and procedures, so they are aware of the best practices to be followed to avoid security breaches. top 5 jobs in cyber :- #1 Network Security Engineer #2 Cyber Security Analyst #3 Security Architect #4 Cyber Security Manager #5 Chief Information Security Officer (CISO)