Posted in Information Security

Access Control

What is Access Control? Access Control is a one of the central of security policy where it focuses on the control policy for the user…

Continue Reading...
Posted in Information Security

Teaming Category in Information Security

As we know, there is a Red Team and Blue Team in the information security environment. However, a lot of people not aware of the…

Continue Reading...
Posted in Information Security

Computer Forensic

What is Computer Forensic? Computer Forensic is an progress that include a few step like presenvation, identification, extrction, interpretation, and documentation of computer evidence. When…

Continue Reading...
Posted in Information Security

Information Gathering Method

Information gathering is gain any information of an organization or a person . Sometimes, Information Gathering need some “soft skills” and social engineering method. There…

Continue Reading...