Bill Brown:Thoughts and Reference Material Online
open-menu closeme
Home
About
Privacy Statement
Contact
🌐
English Português
rss linkedin
  • Amazon Web Services Cloud Information Security Risks and Compliance

    calendar Oct 30, 2025 / Nov 10, 2025 · 26 min read · AWS cloud security compliance IAM encryption risk management network security incident response  ·
    Share on: twitter facebook linkedin copy

    Amazon Web Services Cloud Information Security Risks and Compliance Abstract This paper examines the critical security considerations and compliance requirements for organizations migrating to Amazon Web Services (AWS) cloud infrastructure, addressing the widespread concerns among IT professionals regarding cloud …


    Read More
  • Common Issues with Security Policy Implementation

    calendar Oct 29, 2025 / Nov 10, 2025 · 4 min read · security policy policy implementation security awareness organizational change clean desk physical security culture change compliance  ·
    Share on: twitter facebook linkedin copy

    Common Issues with Security Policy Implementation Original Query Discuss common issues with implementation of security policies and Discuss include common issues and possible mitigations to ensure policy can be enforced. Common Implementation Issues Implementation issues happen with security policies. Some of the …


    Read More
  • Incident Response Process Best Practices and AWS Forensic Procedures

    calendar Oct 28, 2025 / Nov 10, 2025 · 4 min read · incident-response cybersecurity AWS forensics information-security disaster-recovery EC2 security-management  ·
    Share on: twitter facebook linkedin copy

    Incident Response Process Best Practices and AWS Forensic Procedures Topic or Question There are so many methods and best practices for handling incidents. Outline what an incident response process based on what is in the text. What is the process order, what may be missing, and how could the process be improved? …


    Read More
  • Compare and Contrast Various Business Continuity & Disaster Recovery Planning Models

    calendar Oct 27, 2025 / Nov 10, 2025 · 4 min read · business continuity disaster recovery IT management risk management operational resilience emergency planning business operations crisis management  ·
    Share on: twitter facebook linkedin copy

    Compare and Contrast Various Business Continuity & Disaster Recovery Planning Models Introduction Business continuity is essential as described by Hiles (2014). It is the ability of an organization to survive and thrive, survive and bounce back after a disaster or catastrophes. The general objective is to accomplish …


    Read More
  • Common Approaches and Drawbacks in Business Continuity and Disaster Recovery Plans

    calendar Oct 26, 2025 / Nov 10, 2025 · 3 min read · business continuity disaster recovery risk management IT infrastructure emergency planning system redundancy compliance incident response  ·
    Share on: twitter facebook linkedin copy

    Common Approaches and Drawbacks in Business Continuity and Disaster Recovery Plans Business continuity is essential as described by Hiles (2014). It is the ability of an organization to survive and thrive, survive and bounce back after a disaster or catastrophes. The general objective is to accomplish the mission for …


    Read More
  • Appraise the Various Types of Security Architecture & Design Models

    calendar Oct 25, 2025 / Nov 10, 2025 · 7 min read · security architecture information security security models access control integrity models confidentiality enterprise architecture security policy  ·
    Share on: twitter facebook linkedin copy

    Appraise the Various Types of Security Architecture & Design Models Security Architecture Overview Security architecture is the view of the overall system architecture from a security perspective. Security architecture provides insight into the security services, mechanisms, technologies, and features that can be used …


    Read More
  • Common Points of Failure and Strategies to Mitigate Physical Security Deficiencies

    calendar Oct 24, 2025 / Nov 10, 2025 · 4 min read · physical security access control vulnerability study information security security management risk mitigation facility protection  ·
    Share on: twitter facebook linkedin copy

    Common Points of Failure and Strategies to Mitigate Physical Security Deficiencies Layered Defense Approach The nature of physical security ought to be like concentric rings or layers of defense with requirements for access that gets more difficult the closer one get to the center of the rings as described by Peltier …


    Read More
  • Evaluate the Features and Functionality of Various Physical Security Models

    calendar Oct 23, 2025 / Nov 10, 2025 · 5 min read · physical security information security vulnerability study access control security layers risk assessment security management  ·
    Share on: twitter facebook linkedin copy

    Evaluating the Features and Functionality of Various Physical Security Models Three Levels of Information Security Logical security, physical security, and premise security are the three levels of information security as described by Vacca (2013). Logical security protects data stored on computers from software and …


    Read More
  • Cryptology Methods in Organizations, CAC vs. User/Password

    calendar Apr 26, 2024 / Nov 10, 2025 · 4 min read · security access control federal agencies military DOD  ·
    Share on: twitter facebook linkedin copy

    Cryptology Methods in Organizations, CAC vs. User/Password This text explores the different cryptology methods used for authentication within organizations. It compares the Common Access Card (CAC), used by federal agencies, with traditional username and password systems. CAC: The CAC offers two-factor authentication …


    Read More
  • Access Control Methods, A Comprehensive Guide

    calendar Apr 25, 2024 / Nov 10, 2025 · 6 min read · security controls authorization authentication CIA triad  ·
    Share on: twitter facebook linkedin copy

    Access Control Methods: A Comprehensive Guide Access control is a cornerstone of information security, protecting valuable data and assets by regulating who or what can access them. This includes both physical and digital spaces. Access control systems enforce these rules, supporting the fundamental principles of …


    Read More
    • ««
    • «
    • 1
    • 2
    • »
    • »»

Disclaimer

The opinions expressed on this site are my own personal opinions and do not represent my employer’s view in any way.

Recent Posts

  • Systems Engineering and Information Security Integration in the Development Lifecycle
  • Systems Engineering SIMILAR Methodology Example
  • Understanding the Various Branches of Information Security
  • Information Security: Protecting Organizational Assets and Enabling Business Operations
  • A Shaky Start for HealthCare.Gov
  • Does Big Data Bring Big Rewards?
  • Amazon Web Services Cloud Information Security Risks and Compliance
  • Common Issues with Security Policy Implementation

Categories

INFORMATION SECURITY MANAGEMENT 14 DATABASE SYSTEMS 13 SOFTWARE 12 PROJECT MANAGEMENT 9 ORACLE RAC 8 COMPUTER NETWORKS 7 INFORMATION ASSURANCE 4 COLORADO 2 JUNK MAIL 2 LINUX RED HAT AS 2 MANAGEMENT INFORMATION SYSTEMS 2 NEW ZEALAND 2 RED HAT 2 BOULDER 1
All Categories
BOULDER1 COLDFUSION1 COLORADO2 COLORADO/BOULDER1 COMPUTER NETWORKS7 DATA ANALYTICS1 DATABASE SYSTEMS13 DUNNO1 INFORMATION ASSURANCE4 INFORMATION SECURITY MANAGEMENT14 IOT1 JUNK MAIL2 LACROSSE1 LINUX RED HAT AS2 MANAGEMENT INFORMATION SYSTEMS2 NEW ZEALAND2 NEW ZEALAND/CHRISTCHURCH1 ORACLE RAC8 PROJECT MANAGEMENT9 RED HAT2 RESEARCH1 SEARCH ENGINE1 SOCIAL MEDIA1 SOFTWARE12 TECHNOLOGY1 VMWARE1
[A~Z][0~9]

Series

BILL BROWN 68

Tags

PROJECT MANAGEMENT 10 DATA-MANAGEMENT 8 INFORMATION SECURITY 8 RISK MANAGEMENT 8 ORACLE 7 CYBERSECURITY 6 SECURITY 6 AGILE 5 DATABASE-PROGRAMMING 5 RAC 5 ACCESS CONTROL 4 COMPLIANCE 4 NETWORK SECURITY 4 PHYSICAL SECURITY 4
All Tags
ACCESS CONTROL4 ACTIVE SHOOTER TRAINING1 ADMINISTRATION1 AFFORDABLE CARE ACT1 AGILE5 AGILE-DEVELOPMENT1 ALGORITHMS1 ASM2 AUTHENTICATION2 AUTHORIZATION1 AWARENESS1 AWS2 BIG DATA1 BOULDER1 BOULDER COLORADO1 BURN-DOWN-CHART1 BURN-UP-CHART1 BUSINESS CONTINUITY2 BUSINESS INTELLIGENCE1 BUSINESS OPERATIONS1 BUSINESS STRATEGY1 CELLULAR TECHNOLOGY1 CFLOOP1 CHRISTCHURCH1 CHRISTCHURH NEW ZEALAND1 CIA TRIAD1 CICD-PIPELINE1 CLEAN DESK1 CLOUD SECURITY1 CLUSTER1 COLD FUSION1 COLDFUSION1 COLORADO2 COMMUNICATION3 COMPETITIVE STRATEGY1 COMPLIANCE4 CONFIDENTIALITY1 CONNECTIVITY3 CONTROLS1 CRISIS MANAGEMENT1 CULTURE CHANGE1 CURRENTROW1 CURSORS1 CUSTOMER INSIGHTS1 CYBERSECURITY6 DATA ANALYTICS2 DATA COMMUNICATION2 DATA PROTECTION1 DATA SECURITY2 DATA-MANAGEMENT8 DATA-MODELING2 DATABASE3 DATABASE MANAGEMENT1 DATABASE SERVICES1 DATABASE-MODELING2 DATABASE-PROGRAMMING5 DATABASES2 DEFENSE IN DEPTH1 DESIGN2 DIGITAL TRANSFORMATION1 DIRECT MAIL1 DISABLE1 DISASTER PREPAREDNESS1 DISASTER-RECOVERY3 DOD1 DOS ATTACK1 EARNED VALUE MANAGEMENT1 EC21 ECONOMY1 EMERGENCY PLANNING2 EMPLOYEE TRAINING1 EMPTY1 ENCRYPTION2 ENTERPRISE ARCHITECTURE1 ENTERPRISE SYSTEMS1 ENVIRONMENT1 ESX1 EVM1 FACILITY PROTECTION1 FEDERAL AGENCIES1 FEED1 FILE-FORMATS1 FORENSICS1 FUTURE1 GOOGLE1 GOVERNMENT TECHNOLOGY1 HADOOP1 HEALTHCARE1 HEALTHCARE TECHNOLOGY1 IAM1 INCIDENT-RESPONSE3 INFORMATION ASSURANCE2 INFORMATION SECURITY8 INFORMATION TECHNOLOGY1 INFRASTRUCTURE2 INNOVATION1 INSTALLATION1 INTEGRITY MODELS1 INTERNET1 INTERNET INFRASTRUCTURE2 INTERNET TECHNOLOGY1 IOT3 IP ADDRESSING1 IPTV1 ISC2 CERTIFICATION1 ISO-270011 IT FAILURES1 IT INFRASTRUCTURE2 IT MANAGEMENT1 IT SECURITY1 JUNK MAIL2 LACROSSE1 LACROSSETV.COM1 LEFTHAND NETWORKS SAN1 LEGISLATION1 LOW POWER NETWORKS1 M2M COMMUNICATION1 MANAGEMENT1 METHODOLOGY1 MICROSOFT VIRTUAL SERVER1 MILITARY1 MOBILE NETWORKS1 MONITORING TOOLS1 NESTED CFLOOP1 NETDUMP1 NETWORK SECURITY4 NETWORKING2 NETWORKS2 NEW YEAR1 NEW ZEALAND1 NLL1 NORMALIZATION1 OBJECT ORIENTED1 OBJECT-THEORY1 OPERATIONAL RESILIENCE1 OPT-OUT2 ORACLE7 ORACLE HOME2 ORACLE RAC2 ORGANIZATIONAL CHANGE1 PERFORMANCE ASSESSMENT1 PHYSICAL SECURITY4 POLICY IMPLEMENTATION1 POSTAL SERVICE1 PRIVACY3 PROJECT LIFECYCLE1 PROJECT MANAGEMENT10 RAC5 RE-COMPILE1 RE-INSTALL1 RECYCLE BIN2 RED HAT3 REDHAT2 RELATIONAL-DATABASES4 RELATIONAL-THEORY3 RELINK1 REMOVE ORACLE RAC RE-INSTALL2 REQUIREMENTS-ENGINEERING1 RESEARCH2 RISK ASSESSMENT1 RISK MANAGEMENT8 RISK MITIGATION2 ROUTING1 RSS1 SEARCH ENGINE1 SECURITY6 SECURITY ARCHITECTURE1 SECURITY AWARENESS1 SECURITY DOMAINS1 SECURITY FRAMEWORKS1 SECURITY LAYERS2 SECURITY MANAGEMENT4 SECURITY MODELS1 SECURITY POLICIES1 SECURITY POLICY2 SERVER1 SIMILAR PROCESS1 SMART HOME1 SMART LIVING1 SOFTWARE DEVELOPMENT1 SOFTWARE-SECURITY1 SQL2 SQL-TUTORIAL4 STAKEHOLDER ENGAGEMENT1 STOPTHEJUNKMAIL.COM2 SURVEY1 SYSRQ1 SYSTEM REDUNDANCY1 SYSTEMS ENGINEERING2 TEAM COMMUNICATION1 TECHNOLOGY4 TECHNOLOGY ADOPTION1 TECHNOLOGY-COMPARISON1 TELECOMMUNICATION1 TRAINING1 TRIPLE CONSTRAINT2 TROUBLESHOOTING1 VIRTUAL1 VMWARE1 VSAM1 VULNERABILITY1 VULNERABILITY STUDY2 WEB DEVELOPMENT1
[A~Z][0~9]

Links

Oracle Scripts
Boulder CO,80304
Harman Research
BillBrown.info

Copyright 2005-  BILLBROWN.INFO. All Rights Reserved

to-top