Jidaw Systems
(MASTERCOMPUTERS)


Security Resources

More Security Resources & IT Security Articles

 

Security threats affect us all in our information-driven societies. Don't choose to be helpless.

 

     Reduce the opportunities for security breaches

     Secure your IT and physical infrastructure

     Stay ahead of threats to your infrastructure

     Reduce your vulnerability to security threats.

 

 

Processes that Secure Computing

The level of dependence on IT increases rapidly each day. But as dependence increases so does the associated risk. Everybody, not just system auditors or systems professionals, need to be well informed about practical computer security. You must be able to know what is safe computing and what is not. One of the ways of doing that is by identifying the processes that secure computing.

http://www.jidaw.com/itsolutions/security6.html

 

Fighting CYBERCRIME in Nigeria   

There is no doubt that cybercrime is an image nightmare for Nigeria. The  setup of a working group, the Nigeria Cyber Crime Working Group (NCWG) (http://www.jidaw.com/itsolutions/security5.html) is an indication that cybercrime, especially Internet 419 is a source of concern and embarrassment. 

 

How should Cybercrime be fought?

http://www.jidaw.com/itsolutions/security7.html

 

 

More than 419

Recent disclosures by the EFCC that it had arrested over 500 suspected Advance Fee fraudsters should be a matter of serious concern to both the government and the entire public. Is the war against economic crimes is really succeeding?

http://www.jidaw.com/itsolutions/security8.html

 

As Big As Sobig?

August, 2003 is without doubt the month of the worm. And the came the biggest

of all. After the rude shocks of Blaster and Welchia, Sobig.F marked the third major attack for Windows users in the month of August, 2003. What is bigger than Sobig?

http://www.jidaw.com/virus1.html

 

Stop That Intrusion, Before It Stops You!

Intrusions are a key issue in managing IT security. Even if you're not a security pro or expert, an awareness of security issues always helps. So what are intrusions? What should you do about intrusions?

http://www.jidaw.com/security2.html

 

The Essence Of Information System Security And Audit

With many organizations relying more on IT and Communications systems, there is a growing interest in System Security and IT Audit. What the objectives of Information System Security and Audit?

http://www.jidaw.com/security1.html

 

Policy Guidelines On Internet Use

As Internet usage becomes more widespread in offices, Risk is everywhere. There is a need to have guidelines that minimize risks introduced by the Internet.

 

How do you protect your system resources, secure your confidential data, avoid wasteful and costly litigation, protect users from inappropriate content and guard your corporate image?

http://www.jidaw.com/itsolutions/internetpolicy.html  

 

 

Threats to IT

Once IT security is compromised, the benefits of IT pale into insignificance and IT becomes a curse rather than a blessing.
http://www.jidaw.com/article7.html

 

Information System Audit

the FIRST University affiliated course on Information System Audit. PGDISA encourages members of this group to discuss various contemporary issues and to contribute articles for the students of the IS Audit course.

 

Microsoft Security Notification Service

A free e-mail notification service that Microsoft uses to send information to customers about the security of Microsoft products.

http://www.microsoft.com/technet/security/default.mspx.

 

Virus Portal

A free portal dedicated completely to the phenomenon of computer viruses. It contains information and solutions that can prevent these malicious programs from attacking. 

VirusPortal is a Global Virus Observatory that allows you to monitor, in real-time, the virus status worldwide.

http://www.virusportal.com/com/

 

Security Bulletins

Microsoft Security Bulletins and Headlines discussing the technical details and steps you can take to protect your environment.

http://www.microsoft.com/technet/security/current.aspx

 

Sun Microsystems Security Alerts

Security alerts from Sun Microsystems

http://sunsolve.sun.com/pub-cgi/secBulletin.pl

 

Virus Bulletin

Independent antivirus advice

http://www.virusbtn.com/

Network Security Resource (NSR)
http://www.gslis.utexas.edu/~netsec/index.html

 

Security is everybody's business!

 

 

We hope you find this resource bank useful. For more IT Security  Resources, click here:

http://www.jidaw.com/itsolutions/security3.html

 

 

What Do you Have to Say? Post Your Comments about this Content Resource Here.

Comments

comments powered by Disqus

 


Innovation is integral to Sustainability

Read more

Samsung Galaxy Grand Prime: Important Features and Sincere Impressions

Read more

Girls in ICT Day Events and Activities

Read more

Self Worth, New Year

Read more

Girls in ICT Day Events and Activities

Read more

Level of OSS deployment and usage in Nigeria

Read more

Students face the Reality

Read more

Self Worth, New Year

Read more

DISRUPT THE STATUS QUO!

     
1.

Ideas are not enough. You must be action oriented to improve your future.

 

 
2.

Don't just think but act. You get results not only from thinking but from acting.

 

 
3.

You have ideas. You want to achieve. You want opportunity.

 

 
4.

But what are you still doing in your comfort zone? The comfort zone is a dangerous place.

 

 
5.

"I wanted to", "I was going to" cannot put on a light bulb, not to talk of moving you forward.

 

 
6.

Aren't you tired of hoping and criticizing? Stop defending status quo that locks you down.

 

 
7.

GO on the offensive now with IT Education and Empowerment.

 

 
8.

What is the use of ideas without action?

 

 
9.

Start becoming the achiever you deserve to be.

 

 
10.

MAKE SURE THERE IS NO STANDING ROOM FOR EXCUSES.