I Numeri di ISSA JOURNAL

La rivista mensile riservata ai soci.

ISSA Journal Maggio 2019

Adv ISSA Journal May 2019

 

ISSA Journal, la rivista mensile riservata ai Soci AIPSI

I principali articoli nell'edizione di Aprile 2019:

 

  • Choosing Tokenization or Encryption, by Jeff Stapleton - ISSA member, St. Louis Chapter. This article discusses the similarities and differences between two popular cryptographic techniques: tokenization and encryption. When making the decision between protection methods, there are several things to consider, including how the data is used and the key management life cycle.
  • Trends in Security Executive Leadership and the Rise of the vCISO, by Donna Gallaher - ISSA member, Metro Atlanta Chapter. This article discusses the author's personal experience and observations with starting her own business as a virtual CISO.
  • The Mathematics behind RSA Encryption, by William C. Barge - ISSA member, Northeast Indiana Chapter. The author describes the mathematics behind the RSA cryptosystem and a coding technique that can be used to decrease the chance of the calculation resulting in an abnormal end.
  • Industrial Cybersecurity Enhancements, by Cevn Vibert - ISSA member, UK Chapter. This article highlights alerts and advice for end users of automation and control systems (ICS/OT/IACS/SCADA) and selected advisory notes for practitioners of industrial cyber-physical security.
  •  NIST Cryptographic Algorithm and Module Validation Programs: Validating New Encryption Schemes, by Eric Lankford - ISSA member, Fort Worth Chapter.The author provides a simplified overview of how crytographic algorithms and modules are validated according to the Cryptographic Algorithm Validation Program and Cryptographic Module Validation Program.
  • The Python Programming Language, by Constantinos Doskas - ISSA Senior Member, Northern Virginia Chapter. This article continues the discussion about the basic building blocks of the Python programming language. It is the second article in the Python training series. The main topic of this article is file input/output procedures and date processing.

  Inoltre:

  • From the President
  • Sabett's Brief
  • Cryptography As a Weapon
  • Women in Cybersecurity
  • A Historical 180 for Women in Technology
  • Crypto Corner
  • Another Quantum Breakthrough
  • Open Forum
  • Security Engineering and Integration Principles and Myths
  • Cryptic Curmudgeon
  • Quantum and Crypto
  • Security in the News
  • Association News
  • International Board Election: Call for Nominations
  • North Texas Chapter Donates $20,000 for Scholarship Funds
  • Career Center

 

ABOUT AIPSI

AIPSI, Associazione Italiana Professionisti Sicurezza Informatica, e’ il capitolo italiano di ISSA®, un’organizzazione internazionale no-profit di professionisti ed esperti praticanti. Con l’attiva partecipazione dei singoli soci e dei relativi capitoli in tutto il mondo, AIPSI, in qualita’ di capitolo di ISSA, e’ parte della piu’ grande associazione non-profit di professionisti della sicurezza che vanta oltre 13000 a livello mondiale.

Sede Legale

 
AIPSI c/o Malabo Srl Via Savona 26 20144 Milano
 
+02.39443632
 
aipsi@aipsi.org

Sedi Territoriali

  • Sede Territoriale Lecce
    AIPSI c/o Massimo Chirivì - ICT Consultant
    - via Carducci 226 - 73050 Salve (LE)
  • Sede Territoriale Macerata
    AIPSI c/o Studio di Consulenza Rogani Rossano
    - Via Brigata Macerata, 70 62100 Macerata
  • Sede Territoriale Torino
    AIPSI c/o Studio Armoni & Associati
    - Via Quintino Sella, 2 – 10090 Castiglione Torinese (To)
  • Sede Territorale Veneta
    AIPSI c/o Fine Tuning Consulenza Integrata Srl
    - Tel.: (+39) 041 88 77 221
    - Via Ca’ di Cozzi 14 37124 Verona
    - Via Torino, 107 – 30172  Venezia Mestre (VE)
© 2005-2018 AIPSI. All Rights Reserved.

Web Developed by: INNOVAMIND