{"id":127,"date":"2024-02-08T15:47:14","date_gmt":"2024-02-08T15:47:14","guid":{"rendered":"https:\/\/nitaitechnolabs.in\/?page_id=127"},"modified":"2024-02-13T11:51:50","modified_gmt":"2024-02-13T11:51:50","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/nitaitechnolabs.in\/index.php\/cybersecurity\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/nitaitechnolabs.in\/wp-content\/uploads\/2024\/02\/cybersecurity.webp\" alt=\"\" class=\"wp-image-128\" style=\"width:1151px;height:auto\" srcset=\"https:\/\/nitaitechnolabs.in\/wp-content\/uploads\/2024\/02\/cybersecurity.webp 800w, https:\/\/nitaitechnolabs.in\/wp-content\/uploads\/2024\/02\/cybersecurity-300x200.webp 300w, https:\/\/nitaitechnolabs.in\/wp-content\/uploads\/2024\/02\/cybersecurity-768x513.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>A vulnerability is a weakness in the design, implementation, operation, or internal control of a computer or system. Most of the vulnerabilities that have been discovered are documented in the&nbsp;Common Vulnerability and Exposures&nbsp;(CVE) database.&nbsp;An&nbsp;<em>exploitable<\/em>&nbsp;vulnerability is one for which at least one working attack or&nbsp;exploit&nbsp;exists.&nbsp;Vulnerabilities can be researched, reverse-engineered, hunted, or exploited using automated tools&nbsp;or customized script.<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">To manage the information security culture, five steps should be taken: pre-evaluation, strategic planning, operative planning, implementation, and post-evaluation.<\/h2>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<ul>\n<li>Pre-evaluation: To identify the awareness of information security within employees and to analyze the current security policies.<\/li>\n\n\n\n<li>Strategic planning: To come up with a better awareness program, clear targets need to be set. Assembling a team of skilled professionals is helpful to achieve it.<\/li>\n\n\n\n<li>Operative planning: A good security culture can be established based on internal communication, management buy-in, security awareness and a training program.<\/li>\n\n\n\n<li>Implementation: Four stages should be used to implement the information security culture. They are:<\/li>\n<\/ul>\n\n\n\n<ol>\n<li>Commitment of the management<\/li>\n\n\n\n<li>Communication with organizational members<\/li>\n\n\n\n<li>Courses for all organizational members<\/li>\n\n\n\n<li>Commitment of the employees<\/li>\n<\/ol>\n\n\n\n<ul>\n<li>Post-evaluation: To assess the success of the planning and implementation, and to identify unresolved areas of concern.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What you&#8217;ll learn here is..<\/h2>\n\n\n\n<ul>\n<li>Summarize the main purpose of cyber security as a discipline<\/li>\n\n\n\n<li>Summarize the basics of identification and authentication in cyber security<\/li>\n\n\n\n<li>Explain the pros and cons of security through obscurity<\/li>\n\n\n\n<li>Develop a lifelong learning plan for potential careers in cyber security<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>To manage the information security culture, five steps should be taken: pre-evaluation, strategic planning, operative planning, implementation, and post-evaluation. What you&#8217;ll learn here is..<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/nitaitechnolabs.in\/index.php\/wp-json\/wp\/v2\/pages\/127"}],"collection":[{"href":"https:\/\/nitaitechnolabs.in\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nitaitechnolabs.in\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nitaitechnolabs.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nitaitechnolabs.in\/index.php\/wp-json\/wp\/v2\/comments?post=127"}],"version-history":[{"count":5,"href":"https:\/\/nitaitechnolabs.in\/index.php\/wp-json\/wp\/v2\/pages\/127\/revisions"}],"predecessor-version":[{"id":1297,"href":"https:\/\/nitaitechnolabs.in\/index.php\/wp-json\/wp\/v2\/pages\/127\/revisions\/1297"}],"wp:attachment":[{"href":"https:\/\/nitaitechnolabs.in\/index.php\/wp-json\/wp\/v2\/media?parent=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}