The instructor (Sir Bariq Wajahat) of the CEH v10 course at NIE has told me about Rafay Boloch, a young information security expert and evangelist. He has written a book with the title, “Ethical Hacking And Pentesting Book”. He has also attended Bahria University like me. I have downloaded his book and I am going […]
Cloud computing is an emerging field. Under this category, I will write my views and thoughts about cloud computing.
As per Ethicalhackx‘s lecture notes and slides, the following are the elements of information security. Confidentiality Integrity Availability Authenticity Non-Repudiation I am not going in details of them. However, I want to briefly define them as mentioned in page 6 of lecture notes and slides. Confidentiality means “Authorized to have access“. Integrity means “Trustworthiness of […]
To understand what Information Security is all about, one needs to understand the following definition of Information Security. “Information Security ensures the confidentiality, integrity, and availability” . Now that the reader of this blog has understood the basic definition, time to go in details what do Confidentiality, Integrity and Availability mean. Confidentiality: We want to […]
A few weeks ago, I took the initiative to dive deeply to become a Certified Ethical Hacker. However, I knew that I was not in a position to pass the exam of CEH v10 without reading and understanding the theory and practice behind it. So I decided to get enrolled in a course which teaches […]
During education at the school, college and universities, my majors were in the field of Science/Computing/IT/Engineering. Specifically, at the University of Oxford, I attended a course with the title of Security Principles which was taught by Professor. Andrew Martin. For prestudy, I read the first few chapters of a book with the title of Security […]