Don’t go breaking my rules

Imagine a world without rules, with no one telling you what to do, how to do it, why you should it and so on. You could make your own rules, like «no rules allow» or some other nonsense like that. Even though this idea seems pretty cool, it isn’t at all. A world without rules would be pure chaos and madness, with everyone doing what they want no matter what. So we can say that rules are very important no matter what people may think. Rules are the ones that makes us keep control (sometimes) of our nonsense actions. We can find rules everywhere nowadays; in the parks, schools, buses, malls, states, countries, households, internet and sooo many other places. Today I am going to focus on a very specific type of sets of rules which are security policies.

Seguir leyendo «Don’t go breaking my rules»

Can we work in pairs of three?

Many good things in life come in thirds, for example: movies, triplets, videogames sagas, three cakes, or even the three episodes per season of Sherlock. But when it comes to cyber security topics there is also good thirds, like the CIA (not to get confuse with certain agency in the USA). I am talking about Confidentiality, Integrity and Availability. These are some of the most important subjects to take in consideration when you are involve in cyber security. But you maybe asking, what are this concepts? well, basically we use this three concepts as a model that will help us identify if we have a secure system or not.

Seguir leyendo «Can we work in pairs of three?»

The «Y’s» in CyberSecurity

Our generation, the so call «millennials», we were born in a time when computer science was in a constant change. New technology was being made, new algorithms were being researched and so on. Basically, as we have been growing up, technology has also been «growing» up with us and it is still growing, just like us, but with the only difference that we have a dead line and technology doesn’t. As humans when we first use any technological device, like a computer, ipad, smartphone, etc., we are amaze by the amount of actions that device can do.

Seguir leyendo «The «Y’s» in CyberSecurity»