TC2027

Total domination of the World! … Or at least of your OS?

First of all I would like to say this was a post in collaboration with two other people: Cesar Cornejo and Audray (Ariadna) About everybody knows by now that systems need security in order to protect data from access of unauthorized users or malicious programs. Operating Systems are no exception to this rule. Another characteristic… Continue reading Total domination of the World! … Or at least of your OS?

TC2027

Administrating Security (Risk Assessment Methodologies)

It is a fact that system administrators may found themselves also doing some security tasks within their organizations or projects, having to carry  on the security of both users (technical aspects) and upper management (explain costs). What is risk analysis? This is procedure is used to estimate potential losses that may result from system vulnerabilities… Continue reading Administrating Security (Risk Assessment Methodologies)