Author: Phuong D

  • CISSP 8 Security Domains

    The NIST Risk Management Framework (RMF) consists of seven steps, which guide organizations in managing and securing information systems: Please Check Security In All Measures is the phrase use to memorize this Glossary terms Terms and definitions Assess: The fifth step of the NIST RMF that means to determine if established controls are implemented correctly… Read more

  • Google Cybersecurity – Foundations of Cybersecurity

    Glossary terms from module 4 Terms and definitions from Course 1, Module 4 Antivirus software: A software program used to prevent, detect, and eliminate malware and viruses Database: An organized collection of information or data Data point: A specific piece of information Intrusion detection system (IDS): An application that monitors system activity and alerts on… Read more

  • Professional Statement:

    Professional Statement Outline Step 1: List two or three strengths that I currently have and am committed to developing: Step 2: List two values you have: Step 3: Answer clarifying questions: My commitment to adhering to the law and maintaining honesty ensures that I approach cybersecurity with integrity, while my patience allows me to navigate… Read more

  • Google Cybersecurity – Foundations of Cybersecurity

    ,

    Module 2 Computer Virus or malware: malicious code written to interfere with computer operations and cause damage to data and software. History: 1986 Brain Virus by Alvi brother create the software to track pirated software, unintentionally, it spreads globally and slowed down productivity and significantly impacted business. 1988 Robert Morris with the Morris worms intended to… Read more

  • Google Cybersecurity – Foundations of Cybersecurity

    ,

    MODULE 1 Course offer thru Coursera Useful Link: Definition: Cybersecurity or Security is the practice of ensuring Confidentiality, Integrity, and Availability, often noted as CIA, of information by protecting networks, devices, people and data from unauthorized access or criminal exploitation. Threat Actor: any person or group who presents security risks. Threat Actors could be internal… Read more

  • Hello world!

    Welcome to WordPress. This is your first post. Edit or delete it, then start writing! Read more