CATEGORY: Cybersecurity and
18.0 – Physical Security
Well, most people think about bars, locks, alarms and uniformed guards when they think about security. While these countermeasures are by no means the...
17.4 – Tools & Techniques
Hackers want to compromise computers and networks to steal confidential data from enterprises through sophisticated malware. According to Gartner, a technology research firm, an...
17.3 – Vulnerability Prevention
In this section, we’ll look at the top five common vulnerability prevention techniques, and provide tips on how an enterprise can fix such issues,...
17.2 – Security Testing Frameworks
There are several security testing frameworks being used by security inspectors for technical control assessment. The most common security testing frameworks are:
...
17.1 – Vulnerability Assessment & Risk Analysis
Vulnerability assessment is an important sub task of risk analysis. Vulnerability assessment is designed as a tool which detects real risks on resources, using...