IT Security Guide
posted by John Spacey, June 08, 2013A guide to information security including cheat sheets, best practices and checklists.
Area | Tool |
The Basics | Web Security Illustrated Let zombies teach you about security. Security Process A simple process for software security. Security Assessments How to assess information security risks. Security vs. Freedom A examination of security trade-offs. Information Security Myths 7 common information security myths. Physical Security The integration of physical and information security. Authentication vs Authorization The difference explained. |
Techniques | Honeypot Give attackers something they can't resist. Canary Trap Trace the source of information leaks. Real spy stuff. Multifactor Authentication Using multiple methods to confirm identity. |
Principles | Principle of Least Privilege An overview of need-to-know and least privilege. |
Risks, Threats & Vulnerabilities | Risk vs Vulnerability vs Threat The difference explained. Information Security Threats A list of example security threats. Information Security Vulnerabilities A list of example security vulnerabilities. Root Cause of Vulnerabilities 10 root causes of security vulnerabilities. |
Information Security Management | Information Security Management 90 second overview of information security management. ISO 27001 Certification ISO 27001 certification at 50000 feet. |
Web Security | Principles of Web Security The 8 principles of web security. Battleships & Locusts Web security battleships and locusts. Web Security Cheat Sheet Web security cheat sheet. Web Security Checklist A basic web security checklist. |
DDoS | DDoS Motives The 5 motives for DDoS attack. DDoS Future A bleak future of DDoS attacks. DDoS Protection Basics 8 ways to protect your website from DDoS attack |
Security Technology | End-point Protection Platform What is a endpoint protection platform? |
Secure Code Review | Secure Code Review A checklist for secure code reviews. |
SOA Security | SOA Security Overview SOA security from 50,000 feet. SOA Security Challenges 9 SOA security challenges. SOA Security Implementation How to implement SOA security the easy way. |
Related Guides | Risk Guide A guide to business risk. Quality Guide A guide to quality. Enterprise Architecture Guide A guide to enterprise architecture. |
Information Security Careers
A few career resources for information security professionals.Area | Tool |
Job Descriptions | Information Security Officer Information security officer job description. |
Interviews | IT Security Interview Questions 101 IT security interview questions. Interview Guide A collection of interview questions, answers and strategies. |
Simplicable Technology Guide Technology, we've all heard of this one. Let's dive a little deeper ... |
Service-oriented Architecture (SOA) is as simple as can be — it can all be boiled down to these 9 principles. |
Recently on Simplicable
3 Big Data Bulliesposted by Anna MarLike any powerful new tool, big data can either be used to improve life or to make life worse. |
IT ROI is Fading Fast as a Measure of IT Successposted by Anna MarSomebody tell the CFO — IT ROI has gone the way of the dinosaurs. |