> SYSTEM STATUS: ONLINE
> ACCESSING ARCHIVES...
1. Data Handling
Data Handling (Data life cycle) – the stages data goes through from creation to deletion.
2. Data Handling Deep Dive
Data handling how organizations manage and protect data is important because data can be valuable and sensitive. Organizations must protect it from being sto...
3. Encryption Overview
Encryption method of converting readable data into unreadable form to protect it is widely used in modern digital systems. It protects personal information,...
4. Security Awareness Training
Security awareness training teaching employees how to recognize and prevent security risks helps ensure everyone understands their responsibilities tasks the...
5. How Passwords Work
Cybersecurity notes by NotAlive.
6. Data Security Event Example
A raw log detailed system record of network or security activity can show whether someone tried to access a secure file, scan ports, or attack a server.
7. Password Advice and Examples
Password strength depends on length number of characters in the password and complexity using different types of characters like uppercase, lowercase, number...
8. Common Security Policies Deeper Dive
Policies are set according to the needs of the organization and its vision and mission. Each policy should have a penalty or consequence attached in case of...
9. Phishing
Phishing Attacks
10. Supporting Security Policies with Procedures
Acceptable Use Policies Different organizations have different goals for their acceptable use policies. - Some organizations allow wide personal use of the o...
11. Encryption Deep Dive
Encryption has existed throughout human history. - Early examples include cryptic depictions by cave dwellers in the Magura Cave (Bulgaria) and symbols in th...
12. Hashing Deep Dive
Hashing puts data through a hash function or algorithm to create an alphanumeric digest that means nothing to people who might view it. ### Key Points - No m...
13. The Risks of Change
A robust change management process is necessary before making changes to systems. * Changes should be tested in model environments before applying them to a...
14. Change Management Components in the Workplace
Change management happens in a cycle. * There is no real stopping point. * It is continuous, so the environment must be continuously monitored. ### Change Pr...
15. Change Management Components
The change management process includes the following components:
16. Best Practices of Security Awareness Training
Appropriate communication about current and potential threats is needed to keep awareness high. ### Methods to Increase Awareness - Encourage friendly compet...
17. Password Protection
Password Managers Many systems require multiple passwords. Password managers store passwords so users do not have to remember all their security codes for di...
18. Event Logging Best Practices
Different tools are used depending on whether the risk from the attack comes from traffic coming into or leaving the infrastructure. ### Ingress Monitoring I...
19. Security Awareness Training Example
An example of security awareness training can be shown using an organization’s strategy to improve fire safety in the workplace. - Education may help workers...
20. Symmetric Encryption
A symmetric algorithm uses the same key in both the encryption and decryption processes. The decryption process is a mirror image of the encryption process....
21. Logging and Monitoring Security Events
Events Events are actions that occur within the system environment and cause measurable or observable changes in one or more system elements or resources.
22. Asymmetric Encryption
Asymmetric encryption uses one key to encrypt and a different key to decrypt the plaintext. This is different from symmetric encryption, which uses the same...
23. Social Engineering
Social Engineering
24. Hashing
Hashing takes an input of almost any size and returns a fixed-length result called the hash value A hash function is the algorithm used to perform this trans...
25. Configuration Management Overview
Configuration management is a process and discipline used to ensure that only authorized and validated changes are made to a system.
26. Common Security Policies
Security Policies and Regulatory Obligations
27. Data Handling Practices
Data has value and must be handled appropriately.