"Quality is a certain degree of excellence." With these words --- taken from Plato --- I would like to start a new series of publications introducing…
*Symmetric block ciphers* encrypt messages of a specific length that is specific to the chosen algorithm (e.g. 16 bytes for the AES algorithm, 8 bytes…
The dominant organizational culture model for DevOps is the one described in the '2016 State of DevOps Report', created by Westrum. I would like to propose…
So far, I have dealt with the implementation of integrity and authentication services for uploaded data. It is high time to deal with secrecy, that is,…
The National Training Fund (KFS) is a form of financial support through which it is possible to subsidize training for employees and employers. In order…
Anything can happen during training. Nevertheless, the trainer should not assume in advance that it will be something unpleasant and stressful. Most of…
In a previous post on integrity, there was the problem of checking whether a message came from the original source. In other words, whether it was sent…
Integrity (integrity) service is one of the four basic services of information protection. It performs the function of ensuring that the processed information…
Why does architecture matter? An application's architecture defines its individual components, the functions they perform, and the relationships between…
What determines whether a training session is successful or not? To this question most people will answer that it depends on whether the trainer has the…
Nowadays, a component of almost every IT system is its security architecture. It should develop from the beginning of the system's design and form an…
Earlier this year, Salesforce, a popular SaaS CRM solution provider, released a report titled. "[State of IT 2016](https://www.salesforce.com/form/pdf/2016-state-of-it.jsp)."…