Hemant's Blogs

Wednesday, July 6, 2016

OWASP TOP 10 - A5-Security Misconfiguration

›
Please focus on A5 - Explain how you would mitigate. Identify threat sources An anonymous user, a user with less privileges entering...

Perfect Encryption

›
Explain the concept of "Perfect Encryption? Why is it not practical? Perfect encryption is achieved when probability of cracking i...

Asymmetrical encryption

›
Symmetrical encryption requires the participants in the communication to use a shared secret key. Asymmetrical encryption does not require ...
Monday, June 20, 2016

Security and Risk Management - Some basic terms

›
  Risk is the probability of threat agent exploiting vulnerability. Threat is the danger of threat agent exploiting vulnerability.  Da...

Conducting Risk Assessment

›
Conducting Risk Assessment Risk Assessment is part of Risk Management Process. The purpose of Risk Assessment is to identify threats, in...
Thursday, May 12, 2016

Service Applications in SharePoint 2013

›
Abstract This paper explores SharePoint 2013 Service applications in depth along with accounts recommended to configure them to reduce ...
‹
›
Home
View web version
Powered by Blogger.