Explore


CCSP Terms

All-or-Nothing-Transform with Reed-Solomon (AONT-RS) Integrates the AONT and erasure coding. This method first encrypts and transforms the information and the encryption key into blocks in…...

Read More

Elasticsearch Curator

Elasticsearch Curator helps to curate, or manage, the Elasticsearch indices and snapshots by getting the full list of indices from the Elasticsearch cluster as actionable…...

Read More

Configure Splunk Cluster with Commands

BEST PRACTICE Please Plan first based on your requirements and verify your plan. A single cluster or segregated clusters ( by sourcetype, department, or use…...

Read More

RSA Decryption using Extended Euclidean Algorithm

RSA is based on the great difficulty of integer factorization and is the most widely-used public-key cryptosystem used widely in e-commerce systems. Euclid algorithm and…...

Read More

Information Security Framework Implementation Benefits

An Information Security Framework is designed to be flexible enough to be used both by organizations with mature cyber security and risk management programs and…...

Read More