Cyber christina

  • Home
  • Author: Cyber christina

Information Technology General Controls (ITGC)

Information Technology General Controls, popularly called ITGCs refers to the set of control such as policies,procedures, and technologies that an organization puts in place to ensure confidentiality, integrity, andavailability of its information and IT systems.ITGC review is an assessment of these controls to determine their effectiveness in protecting the organization’sinformation and IT systems. A comprehensive […]
Read More

Service Organization Control: An Introduction

Service Organization Control 1 (SOC 1) and Control 2 (SOC 2) are two standards for assessing a service organization’s internal controls. The American Institute of Certified Public Accountants (AICPA) established these standards to assist service organizations in demonstrating their dedication to security, availability, confidentiality, and privacy. SOC 1 is especially concerned with the financial reporting […]
Read More

Cloud Computing Services

In our last article, we talked about the different cloud deployment models: Public, Private, Hybrid, andCommunity. In this article, we will be discussing the cloud computing services which are mainly three types IaaS(Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), and SaaS (Software-as-a-Service). Cloud computing is the distribution of IT resources on-demand through the Internet with pay-as-you-gopricing. Instead of purchasing, […]
Read More

Cloud deployment models

The deployment model is an important aspect of cloud computing. A cloud deployment model is a specificconfiguration of the environment’s variables, including storage capacity, ownership of the deploymentinfrastructure, and accessibility. This implies that deployment models employed by businesses are basedon the ownership (i.e who controls the infrastructure) as well as the location of the infrastructure. […]
Read More

Internet of Things (IoT) Security

The term IoT, or Internet of Things IoT has become one of the most important technologies of the 21stcentury, and it simply refers to the collective network of connected devices (smart devices) each with itsunique identifier automatically collecting and sharing data over a network. These devices range fromordinary household objects to sophisticated industrial tools.The fast […]
Read More

Auditing Artificial Intelligence

Technology keeps evolving, and accompanying these emerging technologies are the associated risks which if adequate security and control is not in place, can erode the overall benefits.There is a lot of buzz around Artificial intelligence as they currently form the basis for all computer learningand are considered the future of all complex decision-making. They have […]
Read More

Top 5 CyberSecurity Groups on Facebook

Facebook is one of the top 10 social media platforms and the largest social media platform globally at 2.85 billion monthly active users worldwide, which accounts for more than 30% of the world’s population having access to the platform. Compiled in this piece in no particular order are the names of top 5 cyber security […]
Read More

Tips for Securing Api’s

API security refers to the process and/or measures of preventing or mitigating attacks on application programming interfaces (APIs). As discussed in the previous article, Application Programming Interface, or API, is a software bridge that enables communication between two applications therefore it is very important that measures are in place to ensure that the communication remains […]
Read More

SAP ERP. An Introduction

SAP ERP is a common ERP (Enterprise Resource Planning) software used by companies for the coordination of all core business functionalities, such as procurement, materials management, production, finance, sales, marketing, and human resources. SAP (Systems, Applications, and Products) is believed to be the most common ERP that assists companies of different sizes, small businesses, midsize […]
Read More