top of page
Master Rumbler
Jul 22, 20233 min read
Protection Mechanisms - Layering, Abstraction, Data Hiding and Encryption
Protection mechanisms are methods or techniques used to safeguard information, resources, or systems from unauthorized access,...
5 views0 comments
Master Rumbler
Jul 19, 20232 min read
Planning - Strategic, Tactical and Operational Plan
In the context of cybersecurity, strategic, tactical, and operational plans play a crucial role in ensuring the effective management of...
3 views0 comments
Master Rumbler
Jul 18, 20232 min read
Identification, Authentication, Authorization, Accountability and Auditing - IAAAA and CIA
Identification, Authentication, Authorization, Accountability, and Auditing (IAAAA) are essential components of cybersecurity that...
126 views0 comments
Master Rumbler
Jul 17, 20231 min read
Disclosure, Alteration and Destruction (DAD)
Unveiling the Risks: Learn about Disclosure, Alteration & Destruction (DAD) in InfoSec. Explore the consequences & effective safeguards
26 views0 comments
Master Rumbler
Jul 16, 20232 min read
Best practices to achieve CIA
best practices to achieve CIA.
Separation of duties (SoD)
Mandatory Vacation
Job Rotation
Least Privileges
Need to Know
Dual Control
16 views0 comments
Master Rumbler
Jul 15, 20233 min read
Confidentiality, Integrity and Availability
The CIA concept, in the context of information security, refers to three fundamental principles: Confidentiality, Integrity, and...
25 views0 comments
bottom of page