Posts

Showing posts from December, 2022

Chapter 10 : Security Audits and PKI Encryption Protocols

Image
  "SECURITY AUDITS AND PKI AND ENCRYPTION PROTOCOLS" OBJECTIVES: ü   Explain how to conduct security audits. ü   Discuss cryptography concepts, hashing and encryption algorithms. ü   Discuss what a PKI (public key infrastructure) is used for.  SECURITY AUDITS An organization's overall security posture, including its cybersecurity posture, can be tested and evaluated in a variety of ways. A security audit provides a high-level summary of these methods. To get the appropriate outcomes and accomplish your company goals, you could use multiple security auditing techniques.  Why Are  Security Audits  Important? To secure your company from data breaches and other cybersecurity threats, conducting a security audit is a crucial first step.  Security audits will  help protect critical data , identify security loopholes, create new  security policies  and track the effectiveness of security strategies. Regular audits can help ensur...

Chapter 11 Redundancy and Disaster Recovery in terms of Security

Image
  Chapter 11 Redundancy and Disaster Recovery in terms of Security Objectives: Implement rights, permissions, and policies in security. Implement a disaster recovery plan  and procedures. What is Redundancy ?      An engineering phrase called redundancy refers to "the duplication of important system components or functions with the purpose of boosting system reliability, typically in the form of a backup or fail-safe, or to increase real system performance."  What does redundancy mean in an IT context?      REDUNDANCY       In computer science there are four major forms  of redundancy:      Hardware      Software      Information     Time      Hardware Redundancy We'll most likely be talking about hardware redundancy when we discuss incorporating redundancy into an infrastructure project.       Hardware redundancy is simply the ...