You are here:-Vulnerability

Cyber Security Briefing – Report

1.    Introduction The information being processed in every organization is meant to be secured from the unauthorized person for various reasons including, leakage interpretation. The organizations are also focusing on implementing best practices that could ensure the security of information that they store for different processes, like for prognosis or for record keeping. In order

Threat Modeling And Vulnerability Assessment – Walmart

1.                Abstract Threat modeling and vulnerability assessment are new methodologies that are being adopted in the development of applications and information systems in order to protect the information in a better way. In this paper, we will talk about why Walmart needs these methodologies despite its security programs and how the company can benefit from

Information system and Technology: In Business and Healthcare

Abstract This article is about the information technology and information system. The concepts of information technology are illustrated with the help of two related topics. This articles illustrates the content of both articles and show how the information systems are being implemented in different industries. This article shows how the technology is being adopted in

NASA Information Security Program

Introduction National Aeronautics and Space Administration is the first institute of its kind in the world that has been putting its efforts in the exploration about the world and the universe that we are living in. The organization has been successful in visiting the moon and other planets in order to collect data and try