Welcome to the computer secure edu. I plan to take you through computer security education.
Each week will cover relevant topics that will be of help securing your computer and other devices
Get link
Facebook
X
Pinterest
Email
Other Apps
Comments
Popular posts from this blog
5 Types of Evidence and How to Use Them in a Workplace Investigation Reference link Character Evidence Character evidence is a testimony or document that is used to help prove that someone acted in a particular way based on the person’s morals, personality, or propensities. While this cannot be used to prove that a person’s behavior at a certain time was consistent with his or her character, it can be used in some workplace investigations to prove intent, motive, or opportunity. Demonstrative Evidence This type of evidence includes items that directly demonstrate a fact. Demonstrative evidence falls into two categories: Physical evidence: pieces of evidence you can see and touch, such as a sack of stolen inventory found in the employee’s locker Illustrative evidence: charts, graphs, photos, models, or recordings, such as a video of an employee harassing another employee This is one of the most reliable types of evidence to use in your investigation. While there are some cases wher...
Change Management System Reference Link According to the PMBOK Guide 6th edition, Change Control is focused on identifying, documenting and controlling changes to the project and the project baselines. In the change management system, you manage the changes related to the project scope, planning, and baselines. For example, you run out of money, and you need additional funding to complete the project, therefore, you will raise a change request for additional funds. Or you may not be able to complete your project within the specified time and require a time extension. In the change management system, the change request is analyzed for any possible impact on any other project objectives. Afterwards, the request is either approved or rejected. To minimize disruption, a change management system must ensure that all parameters are identified and analyzed for any possible impact. If the change request is approved, you will update the concerned baseline, update the project documents, and...
Vulnerability Assessment Vulnerability assessment are rules to follow to help identify the vulnerability of an asset or assets at risk of being lost, taken, damaged, or destroyed. As such, Vulnerability assessment can be used as a tool for managing threats, or if you prefer, managing the risk that accompanies threats. Threats come in a different way. Threat can be caused by nature, such as flooding, hurricanes, earthquakes, etc. It could also happen as a result of an accident, such as fire, breakdown of equipment, collapse of a structure, and the greatest threat is man-made threats, such as crime, sabotage, and terrorism. One of the most common uses for vulnerability assessments is their capability to validate security measures. There are two types of vulnerability assessments: The host and network. Vulnerability assessment is not restricted to computer systems/networks. For example, a physical building can be assessed so it will be clear what parts of the building have what kind ...
Comments
Post a Comment