Skip to main content

ESSAY (INTRODUCTION)

Hi, I would be writing about the progress of my theme topic endpoint security. I am done with my introduction which made use of two references. The first image was the progress of my introduction before it was reviewed by the teacher and the second image is the result after the corrections were implemented.

Image 1(Before correction)




Image 2(After correction)


Comments

  1. your introduction seems clear and straight forward, make sure the structure of others are clear and links accordingly.

    ReplyDelete

Post a Comment

Popular posts from this blog

INITIAL IDEA 1 - ENDPOINT SECURITY

Source: https://www.42gears.com/wp-content/uploads/2021/04/featured.jpg What is Endpoint Security? My initial idea pertains to endpoint security, which is an essential module in my cybersecurity path. Endpoint security is a cybersecurity approach used to defend endpoints such as desktops, laptops, and mobile devices from malicious activities (Crowdstrike, n.d.). According to Crowdstrike, a top endpoint security company, protecting endpoints is crucial in cybersecurity, from small businesses to large corporations. Why Secure Your Endpoints? The Ponemon Institute conducted a study that found 68% of organizations have experienced one or more endpoint attacks that successfully compromised data and/or their IT infrastructure (Expert Insights, 2021). Endpoints provide a large attack surface, and implementing endpoint security solutions can help reduce those attack surfaces. While it's impossible to completely eliminate cyberattacks, reducing the possibilities or chances of an attack occu...

MAJOR PROJECT THEME - ETHICAL HACKING

Source: https://www.softwaretestinghelp.com/wp-content/qa/uploads/2020/06/Ethical-Hacking.png Ethical hacking is a practice in which cybersecurity professionals use their skills to identify vulnerabilities in computer systems and networks. This approach helps organizations proactively detect and fix potential security issues before malicious hackers exploit them. Ethical hacking is a vital tool in today's world where cyber threats constantly evolve and become more sophisticated. The concept of ethical hacking is based on the idea that the best defence against cyber attacks is a good offence. Organizations can identify and fix vulnerabilities before malicious actors can exploit them by conducting controlled and authorised attacks on their own systems. Ethical hacking also helps to improve the overall security posture of an organization, making it more resilient against future cyber attacks. However, ethical hacking is not a license to conduct attacks indiscriminately. Ethical hacker...

Case Study - Method

Source: https://www.google.co.uk/url?sa=i&url=https%3A%2F%2Fwww.facebook.com%2Fmethoduk%2F&psig=AOvVaw1TjPOsSrMz-Vs9czJ_mxRc&ust=1685998095949000&source=images&cd=vfe&ved=0CBAQjRxqFwoTCJCq48K-qv8CFQAAAAAdAAAAABAj Method The methodology employed in the case study described in the book "Cyber Security: Case Study" reflects a systematic and meticulous approach to ethical hacking. This section outlines the key steps and processes undertaken by the ethical hacking team to assess the organization's cybersecurity measures. The first step in the methodology involved the selection of a qualified and experienced ethical hacking team. The team's expertise in various aspects of cybersecurity, such as network security, web application security, and social engineering, ensured a comprehensive assessment across different attack vectors. Careful consideration was given to the team's certifications, qualifications, and track record of successful engagements...