Category Archives: InfoSec

Reliability Analysis of a Web Server by FTA Method

Authors: Gabriel PETRICA, Ionut – Daniel BARBU, Sabina – Daniela AXINTE, Cristian PASCARIU

Published: ADVANCED TOPICS IN ELECTRICAL ENGINEERING – ATEE 2017

“FTA (Fault Tree Analysis) is one of the most used methods for reliability analysis and to quantify the risks associated with the failures of systems. This method performs analysis of the combination of events that can lead to a critical system failure (called Top Event of the designed Fault Tree) and allows calculating the probability of failure. In this paper, has been built the Fault Tree for a Web server considering failures that may occur at hardware level (the basic components for the considered computer system). After realizing the Fault Tree, were made two types of analysis: qualitative (which led to the identification of minimal cut sets) and quantitative (this allowed the calculation of the probability of occurrence of the considered critical event – <<Web server not operational>>.” Read more…

Source: ADVANCED TOPICS IN ELECTRICAL ENGINEERING – ATEE 2017

Image source.

Leave a comment

Filed under Articles, Conference, InfoSec

[Recommended Reading] Red Hat Satellite

Source: Red Hat Satellite Wikipedia

“In computing, Red Hat Satellite is a systems-management product by the company Red Hat which allows system administrators to deploy and manage Red Hat Enterprise Linux (RHEL) hosts. A Satellite server registers with Red Hat Subscription Management, mirrors all relevant software like security errata and bug fixes, and provides this together with locally added software and configuration to the attached servers. The managed hosts register against the local Satellite server and access the provided resources like software packages, patches, configuration, etc. while they also provide information about the current health state of the server to the Satellite. Read more…

Image source

Leave a comment

Filed under General, InfoSec, Recommendations

[Recommended Reading] Interview with Dr. Laurent CHRZANOVSKI

Source: IJISC Issue: Volume 3, Issue 2, Year 2014

“With a PhD in Roman Archaeology obtained at the University of Lausanne, a Postdoctoral Research Degree in History and Sociology at the Romanian Academy of Sciences, Cluj-Napoca Branch and an EU Habilitation to direct PhDs in History and related sciences, Laurent Chrzanovski is PhD co-director at the doctoral school of the University Lyon II Lumière and regularly holds postdoctoral courses within several major EU Universities; he is also Invited Professor at the Cluj-Napoca and Sibiu Universities as well as at the Polytechnics Universities of Bucharest and Cluj Napoca. He is the author/editor of 18 books and of more than a hundred scientific articles.” Read more…

Image source

Leave a comment

Filed under General, InfoSec, Interview

[Recommended Reading] Interview with Ms. Daria CATALUI

Source: IJISC Issue: Volume 4, Issue 2, Year 2015

“Ms. Daria CATALUI is currently dealing with Network and Information Security in Education, stakeholder management and outreach strategies @ENISA. Her work focuses on communicating towards the end user.
Graduate in public policy from the University of Bucharest, further advanced academic qualifications in education: global education, virtual learning, youth studies; security: security studies, information security, data communication; trainer.
Her professional background includes working with the EC and the CoE on youth and educational policies, social entrepreneurship and community development initiatives. During the past years she has been working and learning from skilled professionals @Chelgate consultancy @IER & ANPCDEFP public administrations @CTR & EYF volunteering.
For current work you may consult www.cybersecuritymonth.eu and ENISA’s Education reports.” Read more…

Image source

Leave a comment

Filed under InfoSec, Recommendations

[Recommended Reading] Federated Identity

Source: Federated Identity Wikipedia

“A federated identity in information technology is the means of linking a person’s electronic identity and attributes, stored across multiple distinct identity management systems.Read more…

Image source

Leave a comment

Filed under General, InfoSec, Recommendations