by | Apr 28, 2024 | Cyber Security
Please Answer Each Question Seperately Discussion: Federal Data Privacy or Security Law Nearly every day we hear about a new data breach in the news. Data breach fatigue is a consequence of data breaches becoming so common that people have gotten accustomed to them,...
by | Apr 28, 2024 | Cyber Security
Standards are detailed and precise. You might expect that standards creation would be orderly and precise as well. For most standards agencies, this is true. However, for the Internet, things are a little different. Over the next two weeks, we will focus on Internet...
by | Apr 28, 2024 | Cyber Security
RMF Preparation Assignment Requirements Review NIST SP 800-37 v2 Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, SP 800-37 Rev. 2, National Institute of Standards and Technology (NIST), U.S....
by | Apr 28, 2024 | Cyber Security
Welcome to Weeks 7 and 8! This week we focus on LAN technologies. We will explore the concept of presence, which is a service that can be built on LAN infrastructures. The proliferation of mobile devices and Web applications underscores the fact that electronic...
by | Apr 28, 2024 | Cyber Security
Welcome to Weeks 5 and 6! Networks give us access to almost anything, anytime, anywhere. Unfortunately, they give the same access to criminals, national governments, terrorists, and just plain jerks. Wherever there has been opportunity, there has been crime and...
by | Apr 28, 2024 | Cyber Security
Standards are detailed and precise. You might expect that standards creation would be orderly and precise as well. For most standards agencies, this is true. However, for the Internet, things are a little different. Over the next two weeks, we will focus on Internet...