I'M Adriatik Mehmeti

A

Protect your website, web server and web application against the increasing sophistication of hacker threats.

MY APPROACH TO SECURITY

MY APPROACH TO SECURITY

The Key |to a Safe Organizational Environment

The Key to a Safe Organizational Environment

The safe environment within the organization is the result of the constant maintenance of security levels in accordance with CIA terms. In terms of constant security, we include: equipment, infrastructure, application, intellectual property, source code, workflow.

My approach to cybersecurity solutions consist of three boxes (black, grey, white) which reveal the most critical risks, if we consider corporate security as a triangular pyramid where the upper corner represents the impact, then the lower corners represent the box as a strategic basis.

Black Box

Method Concept

Opportunity

Benefits

Grey Box

Method Concept

Opportunity

Benefits

White Box

Method Concept

Opportunity

Benefits

0

Projects Active

0

Project Done

0

Active Clients

0

Impressed Client

WHAT I DO

WHAT I DO

Embracing Versatility as a Leader

As a wolf who lead the herd without turning his head and who supports everyone, it is important not to limit himself to a single spectre, but rather to be as complete as possible. In many cases, you have come across suggestive phrases to orient the career in a very specific area, in that context, you limit all the other skills of an engineer, from a potential scientist to a worker which may be replaced by an AI due to the concentrated scope

Work dynamics make it difficult for companies and development departments to solve the problem of routine tasks. such as interaction with:

  1. Air conditioners,
  2. Equipment still on,
  3. Manual backup,
  4. Trouble shooting,
  5. Incident response,
  6. Checking reports according to a defined logic,
  7. Processing of data with interest,
  8. Paying invoices,
  9. The same tasks between departments.


For every routine job you spend in HR, cost, time. Some of the disadvantages can be: an employee cannot grow professionally because there are tasks that have a simple or medium logic basis, which it must carry out day by day, of an administrative or financial nature. Basically, when you keep doing something that is routine becomes boring and affects productivity, in development is a principle if an action is required more than twice, then write the function as it will potentially be required still later.


Automation methods depend on software and equipment. which works autonomously and in consistency with employees (application level)

Today in the market there are applications, systems, including CRM, CMS, that are built according to market requirements, so it is necessary to have a patch, an add-on or stand-alone application as an extension for some daily tasks.

In cases where it is designed to meet the requirements of a small office, but we are a small medium business or large enterprise.



  1. Tools

Software with a specific workflow, for example log analysis, report generation from multiple sources, file protectors (cryptography, authorised access, ransomware protect) etc



  1. Applications

The workteam, the organization, analyses the complete workflow to include all tasks with a logical foundation, such as eCampus for universities, System Construction, HMS Hospital Management System, Hydropower etc


  1. SaaS

Software as a service is a way of delivering applications over the Internet—as a service. Instead of installing and maintaining software, all your clients need to do is access it through the Internet, freeing them from complex software and hardware management.

Code inspection is a type of Static testing which aims in reviewing the software code and examining for any error in that. It helps reduce the defect multiplication ratio and prevents the detection of errors at a later stage.


When ordering an application for the organisation, including the source code, it is very important to proceed with a static inspection, because companies that develop software, in most of the cases, do not have qualified security professionals, so the focus is only on features or basic security based on the developers' knowledge.


Libraries are very important for software development, because you don't need to reinvent fire. Everyday, researchers find security flaws that are relevant to the library, the service, the protocol. An inspection before implementation into the organizational environment may prevent leakage, damage, manipulate of information or intellectual property.

Depending on the industry, infrastructure architecture or software is necessary to meet ISO standards.


To build a secure environment, that gives you flexibility, stability, even more important, security, good harmonisation of the components is necessary. Many manufacturers propose their products for security reasons, their implementation and configuration do not determine a safe environment but consumes bandwidth, decreases network speed.


Anything that does not contribute to the working environment may serve increasing threats. A comprehensive plan is required to address these threats.

The IT audit consists of an assessment of an organization's IT systems, infrastructure, policies, operations and determine whether IT controls protect corporate assets, ensure data integrity and are aligned with the business's overall goals.


The audit process includes the following steps or phases:

  1. Planning.
  2. Definition of audit objectives and scope.
  3. Evidence collection and evaluation.
  4. Final documentation and reporting


Support Tech

image/svg+xml
Created with Fabric.js 5.2.4
Created with Fabric.js 5.2.4
Created with Fabric.js 5.2.4
Created with Fabric.js 5.2.4
Created with Fabric.js 5.2.4
Created with Fabric.js 5.2.4
Created with Fabric.js 5.2.4
Created with Fabric.js 5.2.4
Created with Fabric.js 5.2.4

My Skills

HTML/CSS
81%
PHP
90%
Automation
84%
Python
92%
Javascript
80%
Java
91%
troubleshooting
91%
Assembly
15%
News Post

News Post

The JACE 8000 controller taking building automation to the next level
  • 2023-05-30
The JACE 8000 controller taking building automation to the next level

This powerful and versatile device allows for greater efficiency and control in managing your building's HVAC, lighting, security systems, and more. With its flexib

Get In Touch

Get In Touch

© Adriatik Mehmeti

Theme Skin
Select your color
Light & Dark Version