Day Four - My Cybersecurity Journey on Coursera

🔐 Day Four - My Cybersecurity Journey on Coursera
As I continue exploring cybersecurity on Coursera, today’s focus has been truly eye-opening. Building on my previous insights, I’ve delved deeper into cybersecurity, examining crucial concepts like supply chain attacks and cryptographic vulnerabilities.
Supply Chain Attacks are sophisticated threats that target an organization's trusted suppliers or partners, similar to tampering with the sources that provide critical resources. This emphasizes the need for vigilant security management, architecture, and operations—core aspects of the CISSP domains (1, 3, and 7).
Similarly, Cryptographic Attacks present significant risks. Whether it’s a Birthday Attack, Collision Attack, or Downgrade Attack, these attacks aim to undermine the encryption safeguarding our sensitive information. Understanding these threats is vital for maintaining the integrity of secure communications and networks.
Today's journey has reinforced the importance of robust cybersecurity measures and the need to stay ahead of emerging threats. The eight CISSP security domains offer invaluable knowledge and strategies to enhance our defenses and secure our digital environments.
I’m excited to keep building on these foundational concepts and continue this enlightening journey!
#CyberSecurity #CISSP #SupplyChainSecurity #Cryptography #DataProtection #InfoSec
Subscribe to my newsletter
Read articles from alice eneyo directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

alice eneyo
alice eneyo
Compliance Analyst with 2+ years of hands-on experience driving risk assessments, regulatory compliance, and governance initiatives across GRC frameworks including ISO 27001, NIST SP 800-53, SOC 2, and GDPR. Adept at developing and enforcing security policies, conducting internal audits, maintaining risk registers, managing third-party compliance, and supporting ISO 27001 certification readiness. Strong understanding of cybersecurity best practices and risk mitigation strategies. Known for strengthening operational resilience through proactive governance and cross-functional collaboration. Actively seeking opportunities in Compliance, GRC (Governance, Risk & Compliance), or Cybersecurity Analyst roles.