Network Security and Role-Based Access Control

Finjan TeamBlog, Cybersecurity

Finjan Network Security and Role Based Access Control

Within any organization, there may be a diverse range of job functions, each with its own specific tasks, responsibilities, and roles to play in the overall functioning of the enterprise. With much of the work in contemporary businesses being conducted through the use of networked computers and software, there’s a need for enterprises to not only make these resources available … Read More

Software Development Life Cycle or SDLC – the Process of Planning, Developing and Maintaining Secure Software

Finjan TeamBlog, Cybersecurity

Finjan Software Development Life Cycle or SDLC   the Process of Planning, Developing and Maintaining Secure Software

With digital technology so much a part of our daily lives, it’s easy to take software for granted. If an application on our desktop, laptop, or mobile system works, that’s all we’re concerned about. We may not even think of it as software, at all. But if a system or app malfunctions, or if there’s an unwanted intrusion from viruses … Read More

A Closer Look at Multilevel Lattice Security Models

Finjan TeamBlog, Cybersecurity

Finjan A Closer Look at Multilevel Lattice Security Models

Organizations looking to regulate access to the information they routinely work with, and computer systems and communications networks seeking to preserve the confidentiality and integrity of the data they store or transmit will typically require some kind of formalized framework to govern how this is done. Information classifications such as Universal, Unclassified, Confidential, Secret, and Top Secret are one manifestation … Read More

Cybersecurity Risk Assessment – Qualitative vs Quantitative Assessments

Finjan TeamBlog, Cybersecurity

Finjan Cybersecurity Risk Assessment   Qualitative vs Quantitative Assessments

The overall security status of an organization is made up of inputs from the various business units which in turn make up the enterprise – such as Operations, Development, Finance, Audit, and Compliance. One way of establishing the contribution from each department is by assigning it a “risk status” on the basis of cybersecurity risk assessment performed on it over … Read More

Trusted Computing Base or “TCB”

Finjan TeamBlog, Cybersecurity

Finjan Trusted Computing Base or TCB

As well as an infrastructure of components and processes, a computer system also requires a security architecture defining its capacity to resist attacks and attempts at infiltration and providing its capability to detect and respond to threats and changing conditions. With susceptibility to attack being as critical a factor to system stability as the potential failure of its component parts, … Read More

Common Criteria for Information Technology Security Evaluation

Finjan TeamBlog, Cybersecurity

Finjan Common Criteria for Information Technology Security Evaluation

The need to ensure that consumers have access to IT products which are inherently secure has raised a demand for some kind of internationally recognized standard for evaluating and certifying equipment and software. Such a standard exists in what’s collectively known as the Common Criteria or CC. Common Criteria or CC More formally known as the “Common Criteria for Information … Read More