Day Four - My Cybersecurity Journey on Coursera

alice eneyoalice eneyo
1 min read

🔐 Day Four - My Cybersecurity Journey on Coursera

As I continue exploring cybersecurity on Coursera, today’s focus has been truly eye-opening. Building on my previous insights, I’ve delved deeper into cybersecurity, examining crucial concepts like supply chain attacks and cryptographic vulnerabilities.

Supply Chain Attacks are sophisticated threats that target an organization's trusted suppliers or partners, similar to tampering with the sources that provide critical resources. This emphasizes the need for vigilant security management, architecture, and operations—core aspects of the CISSP domains (1, 3, and 7).

Similarly, Cryptographic Attacks present significant risks. Whether it’s a Birthday Attack, Collision Attack, or Downgrade Attack, these attacks aim to undermine the encryption safeguarding our sensitive information. Understanding these threats is vital for maintaining the integrity of secure communications and networks.

Today's journey has reinforced the importance of robust cybersecurity measures and the need to stay ahead of emerging threats. The eight CISSP security domains offer invaluable knowledge and strategies to enhance our defenses and secure our digital environments.

I’m excited to keep building on these foundational concepts and continue this enlightening journey!

#CyberSecurity #CISSP #SupplyChainSecurity #Cryptography #DataProtection #InfoSec

0
Subscribe to my newsletter

Read articles from alice eneyo directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

alice eneyo
alice eneyo

I’m an experienced Governance, Risk, and Compliance (GRC) Analyst skilled in aligning regulatory requirements with Cybersecurity. My expertise includes Risk Management, IT Governance, Data Privacy, and Incident Management, with a focus on safeguarding companies and enhancing operational efficiency. Key skills: Effective communication and stakeholder engagement Strong time management and adaptability Detail-oriented with excellent analytical abilities Experience highlights: Risk Assessment, Business Continuity, Disaster Recovery, Incident Response Planning Policy and procedure creation for regulatory compliance Training on Security Best Practices Familiar with frameworks like PCI DSS, NIST CSF, GDPR, and NDPR. I’m passionate about staying current with industry trends and eager to contribute to dynamic organizations. For collaboration opportunities, contact me at aliceeneyo@gmail.com.