IT Security Guideposted by John Spacey, June 08, 2013
A guide to information security including cheat sheets, best practices and checklists.
|The Basics||Web Security Illustrated
Let zombies teach you about security.
A simple process for software security.
How to assess information security risks.
Security vs. Freedom
A examination of security trade-offs.
Information Security Myths
7 common information security myths.
The integration of physical and information security.
Authentication vs Authorization
The difference explained.
Give attackers something they can't resist.
Trace the source of information leaks. Real spy stuff.
Using multiple methods to confirm identity.
|Principles||Principle of Least Privilege
An overview of need-to-know and least privilege.
|Risks, Threats & Vulnerabilities||Risk vs Vulnerability vs Threat
The difference explained.
Information Security Threats
A list of example security threats.
Information Security Vulnerabilities
A list of example security vulnerabilities.
Root Cause of Vulnerabilities
10 root causes of security vulnerabilities.
|Information Security Management||Information Security Management
90 second overview of information security management.
ISO 27001 Certification
ISO 27001 certification at 50000 feet.
|Web Security||Principles of Web Security
The 8 principles of web security.
Battleships & Locusts
Web security battleships and locusts.
Web Security Cheat Sheet
Web security cheat sheet.
Web Security Checklist
A basic web security checklist.
The 5 motives for DDoS attack.
A bleak future of DDoS attacks.
DDoS Protection Basics
8 ways to protect your website from DDoS attack
|Security Technology||End-point Protection Platform
What is a endpoint protection platform?
|Secure Code Review||Secure Code Review
A checklist for secure code reviews.
|SOA Security||SOA Security Overview
SOA security from 50,000 feet.
SOA Security Challenges
9 SOA security challenges.
SOA Security Implementation
How to implement SOA security the easy way.
|Related Guides||Risk Guide
A guide to business risk.
A guide to quality.
Enterprise Architecture Guide
A guide to enterprise architecture.
Information Security CareersA few career resources for information security professionals.
|Job Descriptions||Information Security Officer
Information security officer job description.
|Interviews||IT Security Interview Questions
101 IT security interview questions.
A collection of interview questions, answers and strategies.
How do you measure a cloud? |
There are three fundamental ways to measure the impact of Enterprise Architecture.|
Common architectural mistakes that can kill a project.|
The great minds of Enterprise Architecture are still grappling with some very basic questions.|