This post will be a short technical comparison of the biggest advanced persistent threats over the last 10 years; Stuxnet, Duqu, Flame and Red October. Stuxnet Stuxnet was spotted as early as June 2009 and this was one of the first major APT’s due to the impressive change in the complexity in comparison to traditional […]
Category: Articles
An Introduction to Multi-level Security Confidentiality: Clark-Wilson and Brewer Nash Models vs Bell-Lapadula and Biba Models
The Biba Model was developed by Kenneth J. Biba and released in 1977 as a security model which focuses on the integrity of data. This was intended for non-military organisations where the integrity of data was more important than the confidentiality of data. This model is built on the state machine concept which focuses on […]
5 Secure Coding Practices for Software Engineers
Developers work towards solving specific issues and since programming is a skill used in many industries, this means there are a lot of developers who are designing and creating solutions/applications. A challenge faced by developers when writing secure software is the vast amount of tutorials available on the internet. These tutorials successfully demonstrate how to […]