SYSTEM ADMINISTRATION

  • KERBEROS

    Kerberos is a computer network security protocol that authenticates service requests between two or more trusted hosts across an untrusted network, like the internet. It uses secret-key cryptography and a trusted third party for authenticating client-server applications and verifying users' identities.

  • DATA LOSS PREVENTION

    Backing up data refers to the process of making a copy of the information typically stored on your desktop or laptop computer, smart phone or tablet.

  • INCIDENT RESPONSE

    Incident response (IR) is the steps used to prepare for, detect, contain, and recover from a data breach.

    The Cyber Incident Response (CIR) scheme assures companies which deal with sophisticated, targeted attacks against networks of national significance.

  • FILESYSTEM

    The way in which files are named and where they are placed logically for storage and retrieval. Without a file system, stored information wouldn't be isolated into individual files and would be difficult to identify and retrieve.

  • OPERATING SYSTEMS

    Operating system security (OS security) is the process of ensuring OS integrity, confidentiality and availability. OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions.