Preparing for CISSP, CISM, CRISC, CISA, CompTIA, CCSP, CCSK, here is what you need to know.

Identification, Authentication, Authorization (source: Pixabay)

If you are preparing for CISSP, CISM, CRISC, CISA, CompTIA, CCSP, CCSK, or any other cybersecurity certification, understanding the basics and knowing about identification, authentication, authorization, auditing, accountability, and non-repudiation, will go long way. Trying to explain these terms in easy-to-understand language and with simple examples from the notes.

Identification

Definition…

A Very Basic Definition Of Cybersecurity For Someone Naive And Not From A Cyebr Background

What is Cyber Security?

Before understanding cybersecurity, let us have a quick look at what the term ‘Cyber’ means that would lead to a better understanding of the concept and the topics ahead:

What is…

The Monetary Authority of Singapore has recently issued the new MAS TRM Guidelines, January 2021. Here is a quick summary of cybersecurity-related questions organizations may ask themselves in their cloud journey while performing a cloud risk assessment or hire an expert who can help guide them in the right direction.

Cloud has its unique threat landscape, vulnerabilities, and risks. Though following basic information security principles is the key to securing the confidentiality, integrity, and availability of your organizational information assets, the Cloud needs a slightly different approach than it used to be in a conventional data center setup. Technology plays…

Rajesh Laskary

Author, Cybersecurity, Cloud, Blockchain Professional(CISSP, CRISC, CISM, CCAK, CIAM, CIST, CEH, COBIT, CBSP, CBE, ISO27001 LA, ISO27005 RM, PMP, PMI-ACP)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store