saeed

Risk Analysis -Part 1

Asset Asset identification is a crucial phase of the risk analysis process. Organizations would do well to first focus on asset identification for critical information systems.An Asset is Anything that has value to an organization, including, but not limited to, another organization, person, computing device, information technology (IT) system, IT network, IT circuit, software (both […]

Risk Analysis -Part 1 Read More »

Basic

Cybersecurity controls

Cybersecurity controls include safeguards or countermeasures implemented to protect an organization from an incident. Cybersecurity controls are used to prevent, detect, and mitigate cyber threats and attacks. There are six types of controls: Preventive Deterrent Detective Recovery Corrective Compensating Preventive Controls: It is always more cost-effective to prevent an event from happening than suffering an

Cybersecurity controls Read More »

Basic

CIA Triad

CIA in security The three main security objectives are confidentiality, integrity, and availability, which form the CIA triad.Many organizations focus on one area more than the others.For example, intelligence agencies are concerned with confidentiality. Financial institutions are focused on accuracy or integrity, and e-business sites emphasize availability.We need to integrate all three elements of the

CIA Triad Read More »

Framework, Technologies