Category: Cybersecurity Essentials for Leaders

20.4 – Disaster Recovery/Contingency Planning

Managing Security policy Security policies should be an enterprise’s first line of protection, but they usually do not play as important a role as they should. The policy format is an existing document that requires being formed in such a…
20.3 – Planning & Managing Security Assessment & Testing

Cryptography & Steganography Cryptography is the method of hiding information and it is used when communicating over an authorized platform like the internet, where information is required to be secured from other third parties. Modern cryptography focuses on emergent cryptographic…
20.2 – Privacy & Human Security Management

Common Attacks Against Enterprises Well, just like pollution was a consequence of the Industrial Revolution, there are several security vulnerabilities that come with the advance usage of the internet. Cyber attacks are exploitations of those vulnerabilities. For the most part…
20.1 – Planning & Managing Enterprise Network Structure

Managing Network Addressing & IP Addresses One of the basic skills needed for an administrator for successful programming and installation of IP network devices is IP addressing mastery. Every device connected to the network must be appropriately addressed, otherwise it…
20.0 – Planning & Managing Enterprise Information System

Enterprise systems planning looks at the entire business to decide what information system the enterprise requires to satisfy its objectives. For large businesses, this can be a costly procedure involving specialists and consultants, but smaller businesses can usually carry out…