Quality Control
Let’s apply quality parameters. Quality control is a process by which entities review the quality of all factors involved in production.
Let’s apply quality parameters. Quality control is a process by which entities review the quality of all factors involved in production.
This system will act as a victim so we intentionally disable the security settings and make it vulnerable. You never do it in PROD systems.
Dz-Win10 #Vulnerable Read More »
Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools.
Dz-Metasploit #Vulnerable Read More »
Kali Linux is an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking, and security assessment.
Dz-Kali #Penetration-Testing #Security-Assessment Read More »
In this post, we will install and configure Windows Server 2022 Evaluation Edition and lay the foundation for the domain controller.
Dz-Dc #Domain-Controller #Dns-Server Read More »
In this post, we will install and configure the Physical Network and Systems. We will also prepare the host system for the virtual machines.
Physical Network And Systems Read More »
In this post, we will list and understand additional PCI DSS requirements for different types of entities.
Additional Requirements Read More »
The organization’s overall information security policy sets the tone for the whole entity and informs personnel what is expected of them.
Requirement 12: Information Security Policy Read More »
System components, processes, and bespoke and custom software should be tested frequently to ensure security controls continue to reflect.
Requirement 11: Test Security Regularly Read More »
Log mechanisms and the ability to track user activities are critical in preventing, detecting, or minimizing the impact of a data compromise.
Requirement 10: Log And Monitor All Access To Data Read More »