Cybersecurity Portfolio

  • About Me
  • Contact Me

Cybersecurity Portfolio

  • About Me
  • Contact Me

Category: Cybersecurity

Posts related to Cybersecurity

Enhancing System Security through Precise File Permission Management in Linux

File and directory permissions in Linux serve as the first line of defense, dictating access rights and thus ensuring the confidentiality, integrity, and availability of data. The necessity to audit and amend these permissions arises from the imperative to adapt to evolving security requirements and organizational policies.

Read More

Enhancing System Security Through Advanced SQL Filtering Techniques

An essential tool in an organizations security strategy is the utilization of SQL (Structured Query Language) queries, enriched with specific filters to extract pertinent security-related data.

Read More

Automating Allow List Updates in Python for Enhanced Access Control

In environments where access to sensitive content is regulated via IP whitelisting, maintaining an up-to-date allow list is crucial. This document details a Python algorithm developed to automate the process of updating an “allow_list.txt” file.

Read More