How Can We Help Users Improve Security?
Aug 2,
2017
Maybe we should rename CIA. I don’t mean the government agency by that name. I’m risking heresy by saying that the tired old acronym CIA for Confidentiality, Integrity, and Availability isn’t sacred text. We talk about CIA in Learning Tree’s System and Network Security Introduction course. Let’s take a critical look at it here. I’ve […]
Cyber Security Tradeoffs
Jun 15,
2016
Cyber Security in a Nutshell Cyber security simplifies to three pillars: Distinguish between good guys and bad guys. [Authentication] Let the good guys access the data in appropriate ways. [Availability] Don’t let the bad guys access the data at all, and don’t let the good guys do something inappropriate. [Confidentiality and Integrity] Our efforts to […]
Using Linux Containers and Docker for Reliable Service
Apr 7,
2016
From time to time, I need to access the web server belonging to a company I do some work for. It’s only used by their employees plus consultants like me, so it’s pretty basic. Just enough to get the job done. The main page carries this warning: This web site will be down for maintenance […]
New Year’s Resolution: Back Up Your Data
Jan 22,
2016
Two years ago I wrote about backing up your personal data using cloud services, and specifically using Amazon’s Glacier service. I’m writing this post a couple of weeks after New Year’s Day, a time of year to think about getting into better habits. Let’s take another look at this. Some simple commands that you learn […]
Reality Versus Cloud Expectations
Mar 3,
2014
Last year I wrote something about maintaining realistic expectations about cloud services. Major cloud service providers have availability performance that can compare favorably to safety-of-life services like 911. But that doesn’t keep people from wanting even more… In Learning Tree’s Cloud Security Essentials course we discuss how availability is the toughest part of the CIA […]