Costas Nicou Back Office

Notes

Foudations of Cybersecurity Week 3

Glossary terms from week 3 Terms and definitions from Course 1, Week 3 Asset: An item perceived as having value to an organization Availability: The idea that data is accessible to those who are authorized to access it Compliance: The process of adhering to internal standards and external regulations Confidentiality: The idea that only authorized […]

Read More

Foudations of Cybersecurity – Week 2 – Part 2

Terms and definitions from Course 1, Week 2 Adversarial artificial intelligence (AI): A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently Authentication: The process of verifying who someone is Business Email Compromise (BEC): A type of phishing attack where a threat actor impersonates a known source to […]

Read More

Foudations of Cybersecurity – Week 2 – Part 1

Computer virus: is a malicious code written to interfere with computer operations and cause damage to data and software. The virus attaches itself to programs or documents on a computer, then spreads and infects one or more computers in a network. A worm is a type of computer virus that can duplicate and spreads on […]

Read More

Personal Power – Day 2

Every single day just a little bit to improve. Use personal power on a daily basis. The controlling force of human behavior the need to avoid pain, the desire to gain pleasure. All you need is ideas that you apply. The two controlling forces is pain and pleasure. When we procrastinate is because we think […]

Read More

Personal Power – Day 1

I am committed to be a lifetime learner. Clear simple workable approaches. We all need a coach to remind us to live to our potential. All is required from my part is: The desire from my part The commitment Personal power means the ability to act. Success and failure are not overnight successes. It’s one […]

Read More

Cybersecurity – Week 1 Notes

Cyber security is the practice of ensuring confidentiality, integrity and availability of information by protecting networks,devices, people and data from unauthorized access or criminal exploitation. Threat actor is any person or group who presents a security risk Personally Identifiable Information or ( PII ) is any information used to infer an individual’s identity (may include […]

Read More
1 2 3 4 5 6 7