Data security

Internet Security Tips and Recommended Software in 2013
Data security

Internet Security Tips and Recommended Software in 2013

Internet is a global networking system. It interconnected computer networks, which are used in the standard Internet protocol suite to serve several billion users worldwide. Internet security is a branch of computer gateway security including browser security, network security, applications and operating system security specifically related to the Internet. Its protect […]

Most Terrifying Online Threats
Data security Technology

Most Terrifying Online Threats

There’s no doubt that the Internet poses threats, despite all the excellent things it can do for us. Whether you’re on your phone, tablet, or computer, you need to watch out for the following four most terrifying online threats. 1. Trojan Horses A Trojan Horse is a type of malware […]

What is DCID 6/3
Certification Data security Technology

What is DCID 6/3

Standing for “Director of Central Intelligence Directive section 6, part 3”, DCID 6/3 represents the C&A (certification and accreditation) methodology used on intelligence projects by federal agencies like the C.I.A. Anyone working on such projects must have SCI clearance (SCI stands for Sensitive Compartmentalized Information). Before DCID 6/3 come to […]

NIST and NIACAP phases
Business Certification Data security Technology

NIST and NIACAP phases

NIST and NIACAP are two frameworks providing accountability for people involved in the security of the information system. They refer to verification and validation of security controls, system characterization and risk assessment as well as accrediting decisions and certification recommendations. NIST is a process designed to deal with unclassified information […]

DITSCAP phases
Business Certification Data security Technology

DITSCAP phases

DITSCAP, developed by DISA (The Defense Information Systems Agency), serves for accrediting and evaluation of systems belonging to the Department of Defense. DITSCAP uses an infrastructure-centric approach for DoD systems. It is a mandatory element for all defense agencies for collecting, storing and processing information (either classified or unclassified). There […]