Home
Business Guide
 
simplicable technology guide   »  security   »  security techniques

Security Techniques


It is easy enough to confuse authentication and authorization.



A digital signature embedded in information that can be tied to a source such as an individual or an IP address.

A honeypot is decoy designed to distract attackers from your information infrastructure.

How to confirm the identity of users and entities.

Physical security is real world security. The type of security that existed long before the information revolution.


How to architect an organization.

Ever wonder when that hot new technology is going to get cheaper? Learn what really drives technology prices.

IT career management

Yes and no. There's no ITIL certification process offered by ITIL itself. However, an organization that's reached ITIL maturity can generally be ISO 20000 certified.


Recently on Simplicable


Web Security Illustrated

posted by John Spacey
How would you explain web security to your grandmother?

The 10 Root Causes Of Security Vulnerabilites

posted by John Spacey
Learn about common root causes of security risks.

Cloud Computing Cheat Sheet

posted by Anna Mar
Cloud computing demystified.

SOA Guide

posted by John Spacey
Our collection of SOA architecture resources and tools.

about     contact     sitemap     privacy     terms of service     copyright