Skip to content

Ismaïl ALTAS

Portfolio & Blog

  • CategoriesExpand
    • Cyber Security
    • Software Testing
    • Web
    • Linux
  • LanguagesExpand
    • English
    • Français
    • Türkçe
  • Certificates
  • Resources
Ismaïl ALTAS
Portfolio & Blog
  • Cyber Security

    Splunk® VS Chronicle; A comparision for SIEM Tools

    A Security Information and Event Management (SIEM) tool is a crucial component in modern cybersecurity strategies. SIEM systems collect, aggregate, and analyze log data from various sources across an organization’s IT infrastructure to provide real-time monitoring, threat detection, and incident response capabilities. Let’s explore Splunk and Chronicle SIEM tools through a story: The Tale of…

    Read More Splunk® VS Chronicle; A comparision for SIEM ToolsContinue

  • Cyber Security

    A Tytpical Audit Example With a Report

    Alma Toys is an imaginaty company and they recently decided to open into global markets via online sales. Upon a Security Audit, we have found that there are many key security areas that the company lacks confiance. Here is the result of our audit : Alma Toys: Scope, goals, and risk assessment report Scope and…

    Read More A Tytpical Audit Example With a ReportContinue

  • Cyber Security

    A Short Story of a Security Audit

    Security audits are systematic evaluations of an organization’s information systems, practices, and controls to ensure they are adequate, effective, and compliant with established policies and regulations. Let’s explore this concept through a detailed scenario. It is is a review of an organization’s security controls, policies, and procedures against a set of expectations. Scenario: MediTech Innovations…

    Read More A Short Story of a Security AuditContinue

  • Cyber Security

    OWASP Security Principles in a Nutshell

    OWASP (Open Web Application Security Project) is a nonprofit foundation dedicated to improving software security. It provides valuable resources, tools, and guidelines for developers and security professionals to create and maintain secure applications. One of OWASP’s key contributions is its set of security principles, which guide developers in building robust and secure software. Let’s explore…

    Read More OWASP Security Principles in a NutshellContinue

  • Cyber Security

    NIST SP 800-53; A must know framework for any US government security specialists

    The NIST CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk. The confidentiality, integrity, and availability (CIA) triad represents the three foundational pillars of security. NIST SP 800-53 is a comprehensive set of security and privacy controls developed by the National Institute of Standards and Technology (NIST)…

    Read More NIST SP 800-53; A must know framework for any US government security specialistsContinue

  • Cyber Security

    Confidentiality, Integrity, and Availability (CIA) triad

    The CIA triad is a fundamental model in cybersecurity that consists of three core principles: Confidentiality, Integrity, and Availability. Let’s explore each component and then tie them together in a broader cyber attack scenario. Confidentiality Confidentiality refers to protecting sensitive information from unauthorized access or disclosure. It ensures that data is only accessible to those who…

    Read More Confidentiality, Integrity, and Availability (CIA) triadContinue

  • Cyber Security

    NIST’s 7 Steps Risk Management Framework

    The NIST Risk Management Framework (RMF) provides a comprehensive, flexible, repeatable, and measurable 7-step process that any organization can use to manage information security and privacy risk for organizations and systems and links to a suite of NIST standards and guidelines to support implementation of risk management programs to meet the requirements of the Federal…

    Read More NIST’s 7 Steps Risk Management FrameworkContinue

  • Cyber Security

    How a security analysts use SIEM dashboards

    Security analysts use SIEM dashboards to monitor, analyze, and respond to security events across an organization’s IT infrastructure. Let’s explore some common dashboard examples and create a story to illustrate their use cases.Common SIEM Dashboard Examples: Imagine a day in the Life of Sarah, the Security Analyst. Sarah, a senior security analyst at TechCorp, starts…

    Read More How a security analysts use SIEM dashboardsContinue

  • Cyber Security

    Security information and event management (SIEM) tools

    Security Information and Event Management (SIEM) tools are comprehensive cybersecurity solutions that collect, analyze, and correlate data from various sources across an organization’s IT infrastructure to detect and respond to security threats in real-time. Here we will dive into a detailed description of SIEM tools and three market-dominant brands: Splunk, IBM QRadar and Exabeam Fusion…

    Read More Security information and event management (SIEM) toolsContinue

  • Cyber Security

    Confidentiality, integrity, and availability (CIA) triad

    The CIA triad consists of three core principles of information security: Now, let’s visualize these concepts through a story: The Tale of SecureBank’s Digital Transformation Sarah, the newly appointed Chief Information Security Officer (CISO) of SecureBank, was tasked with modernizing the bank’s online banking platform while ensuring robust security. She knew the CIA triad would…

    Read More Confidentiality, integrity, and availability (CIA) triadContinue

Page navigation

Previous PagePrevious 1 … 5 6 7 8 Next PageNext

© 2026  | Ismaïl ALTAS

  • Categories
    • Cyber Security
    • Software Testing
    • Web
    • Linux
  • Languages
    • English
    • Français
    • Türkçe
  • Certificates
  • Resources
Search