I'll use this platform to document about cybersecurity
I run for my mental health.
Methods to maintain integrity;
.hashing .checksums .access controls
3. Availability- ensures that systems, applications and data are accessible when needed.
Methods to maintain; .redundancy .load balancing .DDoS protection
Methods to maintain integrity;
.hashing .checksums .access controls
3. Availability- ensures that systems, applications and data are accessible when needed.
Methods to maintain; .redundancy .load balancing .DDoS protection
1. Confidentiality- ensures sensitive information is accessible to authorised individuals or systems.
Methods to maintain confidentiality;
.encryption
.access control
.authentication
1. Confidentiality- ensures sensitive information is accessible to authorised individuals or systems.
Methods to maintain confidentiality;
.encryption
.access control
.authentication
The scene looks like something out of a sci-fi movie. Surely an alien spacecraft will appear, silently, at any moment.
#Photography
The scene looks like something out of a sci-fi movie. Surely an alien spacecraft will appear, silently, at any moment.
#Photography