Hemant's Blogs
Wednesday, July 6, 2016
OWASP TOP 10 - A5-Security Misconfiguration
›
Please focus on A5 - Explain how you would mitigate. Identify threat sources An anonymous user, a user with less privileges entering...
Perfect Encryption
›
Explain the concept of "Perfect Encryption? Why is it not practical? Perfect encryption is achieved when probability of cracking i...
Asymmetrical encryption
›
Symmetrical encryption requires the participants in the communication to use a shared secret key. Asymmetrical encryption does not require ...
Monday, June 20, 2016
Security and Risk Management - Some basic terms
›
Risk is the probability of threat agent exploiting vulnerability. Threat is the danger of threat agent exploiting vulnerability. Da...
Conducting Risk Assessment
›
Conducting Risk Assessment Risk Assessment is part of Risk Management Process. The purpose of Risk Assessment is to identify threats, in...
Thursday, May 12, 2016
Service Applications in SharePoint 2013
›
Abstract This paper explores SharePoint 2013 Service applications in depth along with accounts recommended to configure them to reduce ...
‹
›
Home
View web version