Welcome to the computer secure edu. I plan to take you through computer security education.
Each week will cover relevant topics that will be of help securing your computer and other devices
Get link
Facebook
X
Pinterest
Email
Other Apps
Comments
Popular posts from this blog
5 Types of Evidence and How to Use Them in a Workplace Investigation Reference link Character Evidence Character evidence is a testimony or document that is used to help prove that someone acted in a particular way based on the person’s morals, personality, or propensities. While this cannot be used to prove that a person’s behavior at a certain time was consistent with his or her character, it can be used in some workplace investigations to prove intent, motive, or opportunity. Demonstrative Evidence This type of evidence includes items that directly demonstrate a fact. Demonstrative evidence falls into two categories: Physical evidence: pieces of evidence you can see and touch, such as a sack of stolen inventory found in the employee’s locker Illustrative evidence: charts, graphs, photos, models, or recordings, such as a video of an employee harassing another employee This is one of the most reliable types of evidence to use in your investigation. While there are some cases wher...
Change Management System Reference Link According to the PMBOK Guide 6th edition, Change Control is focused on identifying, documenting and controlling changes to the project and the project baselines. In the change management system, you manage the changes related to the project scope, planning, and baselines. For example, you run out of money, and you need additional funding to complete the project, therefore, you will raise a change request for additional funds. Or you may not be able to complete your project within the specified time and require a time extension. In the change management system, the change request is analyzed for any possible impact on any other project objectives. Afterwards, the request is either approved or rejected. To minimize disruption, a change management system must ensure that all parameters are identified and analyzed for any possible impact. If the change request is approved, you will update the concerned baseline, update the project documents, and...
Type of Encryption There are two types of encryptions in widespread use today: symmetric and asymmetric encryption. The name derives from whether or not the same key is used for encryption and decryption. Symmetric encryption In symmetric encryption the same key is used for encryption and decryption. It is therefore critical that a secure method is considered to transfer the key between sender and recipient Symmetric encryption – Using the same key for encryption and decryption Asymmetric encryption Asymmetric encryption uses the notion of a key pair: a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key. The private key is kept secret by the owner and the public key is either shared amongst authorized recipients or made available to the public at large. Data encrypted with the recipient’s public key can only be decrypted with the corresponding private key. Data can ...
Comments
Post a Comment