Course Overview
Course Overview
Hardware Software
• Susceptibility to Humidity • Insufficient Testing
• Susceptibility to Dust • Lack of Audit Trail
Personnel
Organizational
• Inadequate recruiting process
• Inadequate security awareness • Lack of regular audits
Site • Lack of continuity plans
• Area subject to flood
• Lack of security
• Unreliable power source
• Insecure network architecture
Goal of Computer Security
• The goal is to make it more difficult and less attractive for attackers to
target an organization.
• Adhering to secure coding standards, such as the OWASP Top Ten, can
help mitigate common security risks.
Cont…
controls.
Cont….
• The plan should define the steps to be taken in the event of a security
breach, including incident detection, containment, eradication, and
recovery.