kasinadhsarmablogs.kasinadhsarma.in·Apr 14, 2024Securing Information Systems: Integrating Authentication and Authorization into the CIA TriadTitle: Integrating Authentication, Authorization, and the LAMP Stack into the CIA Triad: A Comprehensive Security Approach Introduction: Introduce the CIA Triad and its significance in information security. Briefly mention that the focus of this blog...Discuss·5 likesCIA TRIAD
kasinadhsarmablogs.kasinadhsarma.in·Apr 13, 2024A Comprehensive Introduction to Cybersecurity FundamentalsCybersecurity Primer: Cybersecurity is the proactive safeguarding of computer systems, networks, software, and data from unauthorized access, manipulation, or destruction. It encompasses a broad spectrum of tools, methodologies, and best practices a...Discusshashfunctions
Brendan Mejiathecyberstudent.hashnode.dev·Aug 17, 2023CIA TriadAh yes, the good ol' CIA triad that is vital, and in all honesty is the foundation of cybersecurity. Typically, for my fellow junior analysts here, I wouldn't find it surprising if for almost every other interview you had been asked the question "Wha...DiscussCIA TRIAD
Benjamin Ololade Adedokunchemben.hashnode.dev·Aug 7, 2023Foundational Knowledge In CybersecurityIntroduction You did well if you chose Cybersecurity Analyst as your preferred role or are presently working there. Cybersecurity analysts, in case you didn't know, are frequently the first line of defence against cybercrime. Isn't this incredible? A...Discuss·30 reads#cybersecurity