<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Abdelkrim</title>
    <description>The latest articles on DEV Community by Abdelkrim (@abdelkrim).</description>
    <link>https://dev.to/abdelkrim</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F351055%2F55a3e450-9eea-4438-a7f1-a3c3148d1b0a.jpeg</url>
      <title>DEV Community: Abdelkrim</title>
      <link>https://dev.to/abdelkrim</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/abdelkrim"/>
    <language>en</language>
    <item>
      <title>Acronyms you should master in Cybersecurity</title>
      <dc:creator>Abdelkrim</dc:creator>
      <pubDate>Wed, 16 Nov 2022 16:02:53 +0000</pubDate>
      <link>https://dev.to/abdelkrim/acronyms-you-should-master-in-cybersecurity-2pnj</link>
      <guid>https://dev.to/abdelkrim/acronyms-you-should-master-in-cybersecurity-2pnj</guid>
      <description>&lt;p&gt;the update list is available here: &lt;a href="https://altf1be.wordpress.com" rel="noopener noreferrer"&gt;https://altf1be.wordpress.com&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ACID  Atomicité, Cohérence, Isolation et Durabilité&lt;/li&gt;
&lt;li&gt;AM    Access Management&lt;/li&gt;
&lt;li&gt;API   Application Programming Interface&lt;/li&gt;
&lt;li&gt;APT   Advanced Persistent Threat&lt;/li&gt;
&lt;li&gt;ARA   Architecture Risk Analysis&lt;/li&gt;
&lt;li&gt;ATP   Advanced Threat Protection&lt;/li&gt;
&lt;li&gt;BCP   Business Continuity Plan&lt;/li&gt;
&lt;li&gt;BIA   Business Impact Analysis&lt;/li&gt;
&lt;li&gt;CA    Certificate Authority&lt;/li&gt;
&lt;li&gt;CASB  Cloud access security brokers are on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed &lt;a href="http://www.gartner.com" rel="noopener noreferrer"&gt;www.gartner.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;CERT  Computer Emergency Response Team&lt;/li&gt;
&lt;li&gt;CICS  Customer Information Control System&lt;/li&gt;
&lt;li&gt;COSI  Committee on Internal Security&lt;/li&gt;
&lt;li&gt;CSPM  Cloud security posture management implements continuous, automated security and compliance processes, primarily to secure the infrastructure where workloads are deployed.&lt;/li&gt;
&lt;li&gt;CVE   Common Vulnerabilities Exposure&lt;/li&gt;
&lt;li&gt;CWPP  Cloud Workload Protection Platform enables you to perform security functions across multiple environments.&lt;/li&gt;
&lt;li&gt;DAG   Data Access Governance&lt;/li&gt;
&lt;li&gt;DCSA  Data-Centric Security Architecture&lt;/li&gt;
&lt;li&gt;DFIR  Digital Forensics and Incident response&lt;/li&gt;
&lt;li&gt;DLO   Data loss objective&lt;/li&gt;
&lt;li&gt;DLP   Data Loss Prevention&lt;/li&gt;
&lt;li&gt;DNS   Domain Name System&lt;/li&gt;
&lt;li&gt;DRP   Disaster Recovery Plan&lt;/li&gt;
&lt;li&gt;EDR   Endpoint Detection and Response&lt;/li&gt;
&lt;li&gt;EDR   Endpoint detection and response is an integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities. &lt;a href="http://www.trellix.com" rel="noopener noreferrer"&gt;www.trellix.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;EDRM  Enterprise Digital Rights Management&lt;/li&gt;
&lt;li&gt;EFW   Enterprise firewall&lt;/li&gt;
&lt;li&gt;EOB   End Of Business&lt;/li&gt;
&lt;li&gt;EPP   Endpoint protection platform is a solution deployed on endpoint devices to prevent file-based malware attacks, detect malicious activity, and provide the investigation and remediation capabilities needed to respond to dynamic security incidents and alerts &lt;a href="http://www.gartner.com" rel="noopener noreferrer"&gt;www.gartner.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;ETDR  endpoint threat detection and response &lt;a href="http://www.trellix.com" rel="noopener noreferrer"&gt;www.trellix.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FQDN  Fully-Qualified Domain Name&lt;/li&gt;
&lt;li&gt;GDPR  General Data Protection Regulation (EU)2016/679&lt;/li&gt;
&lt;li&gt;GRC   Governance Risk &amp;amp; Compliance&lt;/li&gt;
&lt;li&gt;HSM   Hardware Security Module&lt;/li&gt;
&lt;li&gt;ICS   Industrial Control System&lt;/li&gt;
&lt;li&gt;IDS   Intrusion Detection System&lt;/li&gt;
&lt;li&gt;IEC   International Electrotechnical Commission&lt;/li&gt;
&lt;li&gt;IFSMS Information Security Management System&lt;/li&gt;
&lt;li&gt;IGA   Identity Governance and Administration is at the center of IT operations, enabling and securing digital identities for all users, applications and data &lt;a href="http://www.sailpoint.com" rel="noopener noreferrer"&gt;www.sailpoint.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;IoT   Internet Of Things&lt;/li&gt;
&lt;li&gt;IPS   Intrusion Prevention Systems&lt;/li&gt;
&lt;li&gt;IR    Incident Response&lt;/li&gt;
&lt;li&gt;ISA   Information Security Advisor&lt;/li&gt;
&lt;li&gt;ISMS  Information Security Management System&lt;/li&gt;
&lt;li&gt;ITSM  Information Technologie and Service Management&lt;/li&gt;
&lt;li&gt;KMS   Key Management Service&lt;/li&gt;
&lt;li&gt;MDM   Mobile Device Management&lt;/li&gt;
&lt;li&gt;MDR   Managed Detection and response&lt;/li&gt;
&lt;li&gt;MTD   Mobile Threat Defense crsc.nist.gov&lt;/li&gt;
&lt;li&gt;MTTR  Mean time to Recover&lt;/li&gt;
&lt;li&gt;NAC   Network Access Control&lt;/li&gt;
&lt;li&gt;OWASP Open Web Application Security Project&lt;/li&gt;
&lt;li&gt;PAM   Privileged Access Management&lt;/li&gt;
&lt;li&gt;PKI   Public Key Infrastructure&lt;/li&gt;
&lt;li&gt;PSSI  Pfolitique de sécurité des systèmes d’information&lt;/li&gt;
&lt;li&gt;ROPA  Record of Processing Activity&lt;/li&gt;
&lt;li&gt;RPO   Recovery Point Objective. The RPO of a business characterizes the maximum acceptable period of time that can pass between the time that data was last backed up and a critical failure such as a cyber-attack.[source]&lt;/li&gt;
&lt;li&gt;RTO   Recovery Time Objective&lt;/li&gt;
&lt;li&gt;SABSA Sherwood Applied Business Security Architecture&lt;/li&gt;
&lt;li&gt;SCADA Supervisory Control And Data Acquisition&lt;/li&gt;
&lt;li&gt;SEG   Secure Email Gateway is a solution that improves the protection of incoming and outgoing emails &lt;a href="http://www.gatefy.com" rel="noopener noreferrer"&gt;www.gatefy.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;SIAM  Service Integration And Management&lt;/li&gt;
&lt;li&gt;SIEM  System Information &amp;amp; Event Management&lt;/li&gt;
&lt;li&gt;SLA   Service Level Agreement&lt;/li&gt;
&lt;li&gt;SMSI  Système de Management de la Sécurité d’Information&lt;/li&gt;
&lt;li&gt;SOA   Statement of Applicability&lt;/li&gt;
&lt;li&gt;SOAR  Security Orchestration, Automation, and Response&lt;/li&gt;
&lt;li&gt;SOC   Security Operating Center&lt;/li&gt;
&lt;li&gt;SSLC  Secured software lifecycle development&lt;/li&gt;
&lt;li&gt;SWG   Secure Web Gateway protects users from web-based threats in addition to applying and enforcing corporate acceptable use policies &lt;a href="http://www.paloaltonetworks.com" rel="noopener noreferrer"&gt;www.paloaltonetworks.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;TLS   Transport Layer Security&lt;/li&gt;
&lt;li&gt;TOGAF The Open Group Architecture Framework&lt;/li&gt;
&lt;li&gt;UDC   User-Driven Classification&lt;/li&gt;
&lt;li&gt;UEBA  User and Entity Behavior Analytics&lt;/li&gt;
&lt;li&gt;UEM/UES   Unified endpoint management/Unified Endpoint Security&lt;/li&gt;
&lt;li&gt;UTM   Unified Threat Management&lt;/li&gt;
&lt;li&gt;VMDR  Vulnerability Management, Detection and Response&lt;/li&gt;
&lt;li&gt;VPN   Virtual Private Network&lt;/li&gt;
&lt;li&gt;WAAP  Web Application API Protection&lt;/li&gt;
&lt;li&gt;WAF   Web Application Firewall&lt;/li&gt;
&lt;li&gt;XDR   Extended Detection and Response is a security solution based on the concept of correlating and analyzing data from multiple sources, including machine data, log * data, and network data into a single, unified stream &lt;a href="http://www.extrahops.com" rel="noopener noreferrer"&gt;www.extrahops.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;ZTNA  Zero trust network access (ZTNA) is a product or service that creates an identity- and context-based, logical access boundary around an application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a set of named entities &lt;a href="http://www.gartner.com" rel="noopener noreferrer"&gt;www.gartner.com&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>webdev</category>
      <category>ui</category>
      <category>animation</category>
    </item>
    <item>
      <title>COVID-19, mobile apps that preserve privacy. And the winner is ….</title>
      <dc:creator>Abdelkrim</dc:creator>
      <pubDate>Sun, 19 Apr 2020 22:43:24 +0000</pubDate>
      <link>https://dev.to/abdelkrim/covid-19-mobile-apps-that-preserve-privacy-and-the-winner-is-3ifb</link>
      <guid>https://dev.to/abdelkrim/covid-19-mobile-apps-that-preserve-privacy-and-the-winner-is-3ifb</guid>
      <description>&lt;p&gt;The World struggles and needs to choose between data privacy and the interruption of new chains of SARS-CoV-2 (COVID-19, Coronavirus) transmission.&lt;/p&gt;

&lt;p&gt;Here is a summary of the best mobile apps preserving the data privacy built by Governments (&lt;a href="https://github.com/fs0c131y/covid19-tracker-apps"&gt;https://github.com/fs0c131y/covid19-tracker-apps&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;We count 34 mobile apps from countries all over the World, from Argentina to Vietnam.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Some apps focus on cities or provinces (e.g., Madrid – Spain, Lombardia – Italy)&lt;/li&gt;
&lt;li&gt;Google Play (store) (it is a guess) accepts to name an app “COVID” only if a public administration publishes it (try it from your location: &lt;a href="https://play.google.com/store/search?q=covid"&gt;https://play.google.com/store/search?q=covid&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;The mobile app written by Iran is not available on the store and needs to be installed outside the app store&lt;/li&gt;
&lt;li&gt;Apple Store (it is not a guess) accepts to name any app with “COVID” (try it from your location on the &lt;a href="https://apps.apple.com"&gt;https://apps.apple.com&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most mobile apps indicate that their authors pay strict attention to the data privacy of the users or that the mobile app is not mandatory to use.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Some mobile apps require the mobile phone number of their smartphone’ owner to enable the Ministry of Health to contact them&lt;/li&gt;
&lt;li&gt;Geolocations are kept in the mobile phone

&lt;ul&gt;
&lt;li&gt;Geolocations are shared only if the user accepts it&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;li&gt;The authors (Ministry of Health) may ask the geolocation of the user if he/she is infected&lt;/li&gt;
&lt;li&gt;The user is aware of its possible infection by another person if he/she has walked near an infected person in the last 14 days&lt;/li&gt;
&lt;li&gt;Data about phones near the user does not reveal personal identities&lt;/li&gt;
&lt;li&gt;Data about phones near the user are stored on user’ phone [and not centrally]&lt;/li&gt;
&lt;li&gt;Other third-party services will not be able to track the user’ identity&lt;/li&gt;
&lt;li&gt;Users are in control of their data and can revoke consent any time&lt;/li&gt;
&lt;li&gt;User’ data will only be used for COVID-19 contact tracing&lt;/li&gt;
&lt;li&gt;The author of the app collects anonymized data to improve the software&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By far, the availability of the source code facilitates the work of software engineers and fasten the deployment of applications taking good care of the data privacy of individuals, Israël, Iceland and Pasteur Institute and Greater Paris University Hospitals paved the way to other public administrations.&lt;/p&gt;

&lt;p&gt;A mobile app will never save the World from the virus, but it may reduce its spread in the long run (remember that we need to flatten the curve).&lt;/p&gt;




&lt;p&gt;Full details are available here: &lt;a href="https://altf1be.wordpress.com/2020/04/20/covid-19-mobile-apps-that-preserve-privacy-and-the-winner-is"&gt;https://altf1be.wordpress.com/2020/04/20/covid-19-mobile-apps-that-preserve-privacy-and-the-winner-is&lt;/a&gt;&lt;/p&gt;

</description>
      <category>android</category>
      <category>ios</category>
      <category>covid</category>
      <category>mobileapps</category>
    </item>
    <item>
      <title>COVID-19, gather and analyze data from the ECDC</title>
      <dc:creator>Abdelkrim</dc:creator>
      <pubDate>Mon, 30 Mar 2020 23:43:59 +0000</pubDate>
      <link>https://dev.to/abdelkrim/covid-19-analyze-worldwide-data-from-the-ecdc-56ld</link>
      <guid>https://dev.to/abdelkrim/covid-19-analyze-worldwide-data-from-the-ecdc-56ld</guid>
      <description>&lt;p&gt;The notebook displays using plotly the aggregated data by the European Center for Disease Control about the COVID-19 outbreak&lt;/p&gt;

&lt;p&gt;&lt;a href="https://bit.ly/2ylpkeO"&gt;https://bit.ly/2ylpkeO&lt;/a&gt;&lt;/p&gt;

</description>
      <category>jupyter</category>
      <category>covid</category>
      <category>colab</category>
    </item>
  </channel>
</rss>
