top of page


Risk Management LifeCycle
Cybersecurity risk management is a systematic process that organizations use to identify, assess, and mitigate potential threats and...
Master Rumbler
Jul 22, 20232 min read
5 views
0 comments


Protection Mechanisms - Layering, Abstraction, Data Hiding and Encryption
Protection mechanisms are methods or techniques used to safeguard information, resources, or systems from unauthorized access,...
Master Rumbler
Jul 22, 20233 min read
12 views
0 comments


Planning - Strategic, Tactical and Operational Plan
In the context of cybersecurity, strategic, tactical, and operational plans play a crucial role in ensuring the effective management of...
Master Rumbler
Jul 19, 20232 min read
23 views
0 comments


Identification, Authentication, Authorization, Accountability and Auditing - IAAAA and CIA
Identification, Authentication, Authorization, Accountability, and Auditing (IAAAA) are essential components of cybersecurity that...
Master Rumbler
Jul 18, 20232 min read
153 views
0 comments


Disclosure, Alteration and Destruction (DAD)
Unveiling the Risks: Learn about Disclosure, Alteration & Destruction (DAD) in InfoSec. Explore the consequences & effective safeguards
Master Rumbler
Jul 17, 20231 min read
32 views
0 comments


Best practices to achieve CIA
best practices to achieve CIA.
Separation of duties (SoD)
Mandatory Vacation
Job Rotation
Least Privileges
Need to Know
Dual Control
Master Rumbler
Jul 16, 20232 min read
17 views
0 comments


Confidentiality, Integrity and Availability
The CIA concept, in the context of information security, refers to three fundamental principles: Confidentiality, Integrity, and...
Master Rumbler
Jul 15, 20233 min read
26 views
0 comments
bottom of page