Step by step access to TOR network with Tails using VirtualBox

TOR is a network within the internet created for extreme security which has a lot of features for anonymization. So, it’s a way to browse the internet anonymized, unrecognized and hidden from the authorities. In this post I’m going to access TOR and its onion addresses with Linux Ubuntu.

Continue reading Step by step access to TOR network with Tails using VirtualBox

Strategic approach on ICT security

The way of operationally approaching ICT security discussions with executives has become obsolete. Operational means acting on threats, vulnerabilities, risks and audits as they come and interacting with the organization with references to the details of the security issues. This style of approach is valid for smaller organizations but even for small organizations it can become quite overwhelming.

Continue reading Strategic approach on ICT security

Security incident of Zoom video conferences’ video files found from a search engine

On April 3, 2020, Washington Post reported of a security incident of saved videos of Zoom video conferencing tool found in a search engine.

The videos were stored in a separate online storage that was accessed by a search engine which then listed all of the videos in there into its records of web pages. Apparently the storages were publicly available Amazon Web Services’s file buckets.

Continue reading Security incident of Zoom video conferences’ video files found from a search engine

Main points of TOGAF

TOGAF is a enterprise architecture standard that is fully free and open for any organization to use. It is developed by The Open Group and the first version was published in 1995. The standard is full and works fine on its own but most organizations tend to use just parts of it or just certain part to fill their enterprise architecture models. The development group consists of a wide spectrum and the result represents the needs of the whole community of these stakeholders.

Continue reading Main points of TOGAF