CIA Triad
Frameworks that help guide in creating Secure Systems
Building a Strong Defence (Defence in Depth)
Securing Devices: Mobile, Workstations, and loT
Mobile Devices
Workstations
IoT Devices
(smart light bulbs, thermostats, even your fridge)
- they’re all connected, and that means they need protection too
Authentication (Proving Who You Are)
Authorisation: Deciding Who gets Access
Password Best Practices