877.791.9571 |

About the Author:

Stuart Gentry is an InfoSec Institute contributor and computer security enthusiast/researcher. He holds a Master's degree in Information Assurance with GSEC and GCIH certifications. He has been interested in hacking since 1984 and has become more focused in software reverse engineering and malware research since September 2011. Stuart is always looking to learn new coding languages and exploitation methods. Contact Stuart via email at gentry_s1@yahoo.com or LinkedIn at www.linkedin.com/in/stuartgentry.
Identity-management-02152013

Identity Management and Access Control in a Single Sign-on Environment

In this article you will learn the following information:

How businesses manage electronic identities and provide access control to their employees, customers, and, potential partners in a single-sign-on (SSO) environment.
Definition […]

authentication-sized

To Trust or Not To Trust?

,

While taking a knowledge management course in school, one thing that struck me was the common theme among classmates of, “…as long as the knowledge is there, timely, and […]

pw

Access Control: Models and Methods

There are times when people need access to information, such as documents, slides, etc., on a network drive but don’t have the appropriate level of access to read and/or […]

chalkboard

The Easier Form of Hacking: Social Engineering

When we talk about hacking, especially in today’s world, we hear the media giving us the stories of how hackers hack into a database and steal information from it, […]