Physical Security is an important area of Information Security Risk Assessment Process. If other technical controls are well placed coupled with weak physical security, the breach is prone to occur. Physical access controls fall first in the line of defense to deter/detect the malicious activities and must be the strongest. The steps of physical security assessment comprises of the following steps
Read More
With respect to cyber incident handling, we here present a detailed checklist that might be used for as a one stop solution for cyber incident handling.
Read More
Third party auditor (TPA) to provide objective assurance and audit services designed to monitor and assess the conformance by the operating agency and add value to improve the performance of the organization. The third party audit agency (TPA) will audit the operations and management, security and compliance with standards and processes of the organization.
Read More
Are you a cyber security professional looking for a great career in this exciting domain. CISSP, CISM, CISA, CEH, ISO 27001 LA, CCSP, GSEC, OSCP
Read More
Biometrics is an authentication mechanism that falls in the ‘something you are’ (type 3) factor. Know about False Rejection Rate (FRR) , False Acceptance Rate (FAR), Crossover Error Rate (CER) and how these are related. Also learn effectiveness parameters for biometrics like enrollment time, throughput and user acceptance.
Read More