How Can We Help Users Improve Security?

Maybe we should rename CIA. I don’t mean the government agency by that name. I’m risking heresy by saying that the tired old acronym CIA for Confidentiality, Integrity, and Availability isn’t sacred text. We talk about CIA in Learning Tree’s System and Network Security Introduction course. Let’s take a critical look at it here. I’ve […]
Read More ›

Our Continuously Connected Lives: Benefits and Risks

The Internet of Things (or IoT) is already here. As I described last week, it has already been misused to launch the largest DDoS (or Distributed Denial of Service) attack in history. Attacks against cyber security writer Brian Krebs and a French Internet service provider moved the record flood rate from 363 Gbps to 620 […]
Read More ›

Using Linux Containers and Docker for Reliable Service

From time to time, I need to access the web server belonging to a company I do some work for. It’s only used by their employees plus consultants like me, so it’s pretty basic. Just enough to get the job done. The main page carries this warning: This web site will be down for maintenance […]
Read More ›

What Is Computer Security?

What is “computer security”? When Adrian Bryan and I set out to write our Introduction to System and Network Security course for Learning Tree some years ago, we needed to start with a definition. It served as a sort of goal or guiding light in writing the course materials. The definition is from Simson Garfinkel […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.