Forwarded from Javan Computing Research Center: Cloud & Blockchain (Morteza Javan)
تغییر سیاست های کاخ سفید در حوزه رایانش ابری از استراتژی Cloud First به Cloud Smart
> https://cloud.cio.gov/strategy/
> پیش از این در سال 2011، استراتژی دولت فدرال در حوزه رایانش ابری با سیاست Cloud First مطرح شده بود.
#CloudFirst #CloudSmart
@msjavan_ir
> https://cloud.cio.gov/strategy/
> پیش از این در سال 2011، استراتژی دولت فدرال در حوزه رایانش ابری با سیاست Cloud First مطرح شده بود.
#CloudFirst #CloudSmart
@msjavan_ir
To be Cloud Smart, agencies must consider how to use their current resources to maximize value: reskilling and retraining staff, enhancing security postures, and using best practices and shared knowledge in acquisitions. Cloud Smart is about equipping agencies with the tools and knowledge they need to make these decisions for themselves, rather than a one-size-fits-all approach.
Words of the day...
👇👇👇
IDS & SIEM
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms
👇👇👇
IDS & SIEM
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms
Words of the day...
👇👇👇
HoneyPot & HoneyNet
A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources.
👇👇👇
HoneyPot & HoneyNet
A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources.
Word of the day...
👇👇👇
Information Sharing and Analysis Center
An Information Sharing and Analysis Center or (ISAC) is a nonprofit organization that provides a central resource for gathering information on cyber threats to critical infrastructure and providing two-way sharing of information between the private and public sector.
👇👇👇
Information Sharing and Analysis Center
An Information Sharing and Analysis Center or (ISAC) is a nonprofit organization that provides a central resource for gathering information on cyber threats to critical infrastructure and providing two-way sharing of information between the private and public sector.
itil-4-foundation-brochure.pdf
352.8 KB
Emailing itil-4-foundation-brochure.pdf