Tagged articles
3 articles
Page 1 of 1
Woodpecker Software Testing
Woodpecker Software Testing
Jan 5, 2026 · Information Security

Deep Dive into the Five Core Security Attributes for Robust Testing

This article analyses the five fundamental security attributes—confidentiality, integrity, non‑repudiation, auditability and authenticity—detailing their definitions, testing goals, key techniques, a comprehensive banking transfer case study, discovered vulnerabilities, remediation measures, metrics and best‑practice recommendations for continuous security testing.

Authenticationauditabilityconfidentiality
0 likes · 16 min read
Deep Dive into the Five Core Security Attributes for Robust Testing
Architects Research Society
Architects Research Society
Jul 8, 2020 · Blockchain

Comparing Blockchain Databases with Traditional Centralized Databases

Unlike traditional client‑server databases, blockchain stores data across decentralized nodes, offering built‑in security and immutable history, but at the cost of slower performance and limited confidentiality, making it suitable for specific record‑keeping functions while centralized databases excel in speed and controlled access.

BlockchainDecentralizationcentralized database
0 likes · 7 min read
Comparing Blockchain Databases with Traditional Centralized Databases
Efficient Ops
Efficient Ops
Oct 7, 2015 · Information Security

Why Information Security Mirrors Protecting Your Money: 4 Core Principles Explained

The article explores the essence of information security by comparing it to safeguarding personal money, detailing the four fundamental attributes—confidentiality, integrity, availability, and controllability—and illustrating how different conditions shape security needs, from personal to enterprise contexts.

AvailabilityData ProtectionInformation Security
0 likes · 13 min read
Why Information Security Mirrors Protecting Your Money: 4 Core Principles Explained