6 C
London
Monday, November 20, 2017
Home Authors Posts by Joe Woods

Joe Woods

81 POSTS 0 COMMENTS
I have over 25 years experience in Information Technology and Information Security. In the last 7 years, my focus has been on Information Security and Risk Management, with day to day responsibility for managing all aspects of Information and Technology Risk Management (Information Risk, Technology Risk, Business Continuity and Cyber Crime). Previous roles included Solutions Architecture, Security Engineering, Network Engineering, IT System administration of Unix, Linux and Windows infrastructure services, IT Quality Assurance and Software Testing, IT Development. Specialties include: + Risk Management (Assessment, Threat Mitigation and reporting) + Cyber-crime – Anti-malware (Trojans, MITB, MITM, Viruses, Spyware), Anti-phishing (Fraudulent websites and scams) + Information Security, Ethical Hacking /Penetration Testing, ISO 27001 + Fraud management + Development and Testing + Infrastructure services, IT Infrastructure Library (ITIL), + Business Continuity and Disaster Recovery.

Data Encryption Standard (DES)

DES is a symmetric key cryptosystem that was devised in 1972 as a derivation of the Lucifer algorithm developed by Horst Feistel at IBM.He...

Secret Key Cryptography (Symmetric Key)

Secret key cryptography is the type of encryption that is familiar to most people. In this type of cryptography, the sender and receiver both...

Non-Discretionary Access Control

A central authority determines what subjects can have access to certain objects based on the organizational security policy. The access controls might be based on...

Discretionary Access Control

The subject has authority, within certain limitations, to specify what objects are accessible.For example, access control lists can be used.An access control list (ACL) is...

Mandatory Access Control

The authorization of a subjects access to an object depends upon labels, which indicate the subjects clearance, and the classification or sensitivity of the object.For example,...

Ubiquiti EdgeMAX – How to set QoS parameters for VoIP applications

These instructions assume: •eth0 is your connection to the internet. •eth1 is your local area network. •Downstream bandwidth is 5000kbit. •Upstream bandwidth is 1000kbit. •You want to guaranty 25%...

Ubiquiti EdgeMAX – IPv6 Tunnel

Learn the how to create an IPv6 tunnel.  IPv6 Tunnels make possible to reach the IPv6 Internet by tunneling over existing IPv4 connections from your...

Ubiquiti EdgeMAX – BGP (Border Gateway Protocol)

Learn how BGP is used and configured between two Autonomous Systems Diagram Showing Two Different Autonomous Systems (AS) R1: Router in AS 1 R2: Router in AS...

Ubiquiti EdgeMAX – Manage the configuration file

Learn how to make and save changes to the active configuration file. Typically, you use the save command to save the active configuration to disk...

Windows 7 Networking – Quality of Service (QOS)

Managing Network Traffic Windows 7 and Vista support two different forms of QOS. Policy-based QOS prioritizes and throttles network traffic based on static parameters set...

How to implement PXE with Synology NAS

 Overview Equipped with TFTP support and Synology's DHCP Server package, DiskStation can serve as an integral part of your Preboot Execution Environment (PXE) setup. With...

How to set up the Synology NAS as the VPN Server

Overview A VPN (virtual private network) is a private network that uses a public network infrastructure (usually the Internet) to provide secure and encrypted connections...