Understanding the Various Branches of Information Security
Nov 3, 2025 / · 5 min read · information security cybersecurity security layers defense in depth information assurance network security physical security security management ·Understanding the Various Branches of Information Security Introduction The purpose of information security is to protect a companies or organization's valuable assets as Peltier (2013) points out. Information security includes securing computer hardware and software and information or data. The information security …
Read MoreInformation Security: Protecting Organizational Assets and Enabling Business Operations
Nov 2, 2025 / · 4 min read · information security cybersecurity risk management security frameworks security domains ISC2 certification security policies active shooter training ·Information Security: Protecting Organizational Assets and Enabling Business Operations Purpose of Information Security The reason that information security exists is to protect a company's or organization's valuable assets. Information security includes information or data, computer hardware, and software. The …
Read MoreIncident Response Process Best Practices and AWS Forensic Procedures
Oct 28, 2025 / · 4 min read · incident-response cybersecurity AWS forensics information-security disaster-recovery EC2 security-management ·Incident Response Process Best Practices and AWS Forensic Procedures Topic or Question There are so many methods and best practices for handling incidents. Outline what an incident response process based on what is in the text. What is the process order, what may be missing, and how could the process be improved? …
Read MoreAppraise the Various Types of Security Architecture & Design Models
Oct 25, 2025 / · 7 min read · security architecture information security security models access control integrity models confidentiality enterprise architecture security policy ·Appraise the Various Types of Security Architecture & Design Models Security Architecture Overview Security architecture is the view of the overall system architecture from a security perspective. Security architecture provides insight into the security services, mechanisms, technologies, and features that can be used …
Read MoreCommon Points of Failure and Strategies to Mitigate Physical Security Deficiencies
Oct 24, 2025 / · 4 min read · physical security access control vulnerability study information security security management risk mitigation facility protection ·Common Points of Failure and Strategies to Mitigate Physical Security Deficiencies Layered Defense Approach The nature of physical security ought to be like concentric rings or layers of defense with requirements for access that gets more difficult the closer one get to the center of the rings as described by Peltier …
Read MoreEvaluate the Features and Functionality of Various Physical Security Models
Oct 23, 2025 / · 5 min read · physical security information security vulnerability study access control security layers risk assessment security management ·Evaluating the Features and Functionality of Various Physical Security Models Three Levels of Information Security Logical security, physical security, and premise security are the three levels of information security as described by Vacca (2013). Logical security protects data stored on computers from software and …
Read MoreA Recommended Course of Action for Information Security & Risk Management
Apr 5, 2024 / · 5 min read · information security it security data security cybersecurity risk management ·A Recommended Course of Action for Information Security & Risk Management This blog post explores a recommended course of action for implementing information security risk management within an organization, drawing insights from ISO 27002. keywords: Information security and risk management are vital to the safety of …
Read MoreWhy is an Information Security Program Important for Your Company?
Apr 4, 2024 / · 3 min read · information security cybersecurity data security risk management employee training ·Why is an Information Security Program Important for Your Company? Understand why information security programs are crucial for businesses. Learn how they protect assets, raise awareness, and manage risks. Why is an information security program important? Information security is relevant and essential to a company …
Read More