Managing risk to information assets. Business strategy –> IT strategy All managers need to work together on the overall plan. Planning (strategic, tactical and operational) […]
Category: study notes
Vulnerability Assessment
FOOTPRINTING: Online search. Employee directories, locations,… for social engineering or tech attack Source Code Business/Gov websites with info on management team and financial holding WHOIS […]
Fundamental cybersecurity measures
Securing data requires a comprehensive approach to mitigate all possible vulnerabilities. Areas to make sure to cover are: SECURITY POLICIES INFRASTRUCTURE PHYSICAL MACHINES LAST BUT […]