Ndubuisi Ekekwe
AUTHOR: Ndubuisi Ekekwe
17.2 – Security Testing Frameworks
There are several security testing frameworks being used by security inspectors for technical control assessment. The most common security testing frameworks are: Open Source Security Testing Methodology Manual (OSSTMM) Information Systems Security Assessment Framework (ISSAF) NIST 800-115 Open Web Application Security Project (OWASP) All these frameworks provide a detailed, process-oriented way in which to implement a […]
17.1 – Vulnerability Assessment & Risk Analysis
Vulnerability assessment is an important sub task of risk analysis. Vulnerability assessment is designed as a tool which detects real risks on resources, using strong but neutral procedures, and sometimes suggests necessary fixes, for the overall safety of critical assets, which if destroyed or degraded could cause operational failures over an extended period of time. […]
17.0 – Enterprise Cybersecurity Policy
The solutions created in the field of information technology (IT) are driven by the demands of our routine business and personal activities. The abilities to deliver efficient communications and technologies that support business procedures, at affordable prices, are a foundational component of successful IT programs. The implication is that IT does move quickly to align […]
Zenvus – enabling African “motor for development”
16.4 – Legal Process & Punishment
Internet technology is becoming increasingly more innovative with amalgam of opportunities to make money. Where there is more money, definitely there are more chances of cybercrimes, punishable by legal processes. Across nations in their different Information Acts, the overriding message is that there should be different legal processes and punishments for different types of cybercrimes. […]






