Chapter 10 : Security Audits and PKI Encryption Protocols
"SECURITY AUDITS AND PKI AND ENCRYPTION PROTOCOLS" OBJECTIVES: ü Explain how to conduct security audits. ü Discuss cryptography concepts, hashing and encryption algorithms. ü Discuss what a PKI (public key infrastructure) is used for. SECURITY AUDITS An organization's overall security posture, including its cybersecurity posture, can be tested and evaluated in a variety of ways. A security audit provides a high-level summary of these methods. To get the appropriate outcomes and accomplish your company goals, you could use multiple security auditing techniques. Why Are Security Audits Important? To secure your company from data breaches and other cybersecurity threats, conducting a security audit is a crucial first step. Security audits will help protect critical data , identify security loopholes, create new security policies and track the effectiveness of security strategies. Regular audits can help ensur...