
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Access control is “the process of granting or denying specific requests . . . ".
This process needs the following inputs:
• Who issued the request?
• What is requested?
• Which rules are applicable when deciding on the request?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Amazon Web Services (AWS) Virtual Private Cloud (VPC) Flow Logs containing network flow metadata offer a powerful resource for security. Not only can you log all IP flows in a VPC network with help from flow logs, but you can also use this data to perform various types of flow analysis.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
WHAT IS THE SURFACE WEB?
Everyone who has access to the internet uses the Surface web, or as some like to call it — the Clearnet. That content is indexed by different search engines like Google, Bing, Yandex, Duckduckgo, Yahoo, Baidu, etc. A typical search query consists of only keywords and even when you do not know the exact address of a website, those keywords are taken as inputs by the search engines to use their algorithms and give you the best results possible. Again — results consist of only indexed content by that search engine.
Although we use the Surface web for quite a long part of our days and feel like it is infinite, it actually is just a fraction of the whole package. The remaining part is hidden or invisible, but it is not impossible to access it.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
IBM created the IBM Security Framework to help ensure that every necessary IT
security aspect can be properly addressed when you use a holistic approach to
business-driven security.