Introduction to Information Security

แชร์
ฝัง
  • เผยแพร่เมื่อ 12 ก.พ. 2021
  • The video explains information security, information system and the basic security requirements (Authentication, CIA, Impact, Risk)

ความคิดเห็น • 6

  • @olubusuyiojo6271
    @olubusuyiojo6271 5 หลายเดือนก่อน

    This is very Helpful

  • @mom0f457
    @mom0f457 3 ปีที่แล้ว +1

    Thank you so much, you are such a great instructor.

  • @dmnick123ify
    @dmnick123ify 3 ปีที่แล้ว

    Towards the end you talked about Risk Assessment, SDLC, and RMF. If an organization is going to implement RMF, which already has some risk assessment (during categorization, and scans), What is the purpose of the Risk Assessment itself.
    Because many of the steps within the 9 step Risk Assesment process are kind of performed during the categorize step of the RMF. Or, are you saying risk assessment is done to support the Categorize step in RMF steps?

    • @DVineConsulting
      @DVineConsulting  3 ปีที่แล้ว

      The purpose of conducting risk assessment is to determine the risk to an organization or agency, risk is something that is yet to happen, you are thinking ahead of what will be the impact to your business or agency should there be a security breach.

  • @fixghanamovement4960
    @fixghanamovement4960 2 ปีที่แล้ว

    How do I get in contact with you?

    • @DVineConsulting
      @DVineConsulting  2 ปีที่แล้ว

      Send an email to info@dvineconsult.com