Skip to main content


Showing posts from October, 2021

My InfoTech Journal!

My InfoTech Journal: Decoding the Networking Enigma: OSI vs. TCP/IP Reference Models

My InfoTech Journal: Decoding the Networking Enigma: OSI vs. TCP/IP Reference Models The OSI (Open Systems Interconnection) Reference Model and the TCP/IP (Transmission Control Protocol/Internet Protocol) Reference Model: The OSI Reference Model and the TCP/IP Reference Model are both conceptual frameworks used to understand and standardize how different networking protocols and technologies interact. Here are some areas of comparison: 1. Number of Layers: OSI Model : It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and  TCP/IP Model : It has four layers: Network Interface, Internet, Transport, and Application. 2. L ayer Functionality: OSI Model : Tends to be more comprehensive and abstract, defining each layer's functions independently. TCP/IP Model : Reflects the actual implementation of the Internet and focuses on how protocols are used in practice. 3. Adoption / Use: OSI Model : Less commonly used in practice, but it is still valuab

What are the High-Demand Information Security Careers

My InfoTech Journal: Information Security Careers High-Demand Careers in Information Security  Information Security is a field with so many potential career directions and which the demand for these skill sets are continuously growing. I have done a research of the high-demand careers in LinkedIn using Information Security career keywords.  I am sharing the search results with the corresponding statistics. I hope this will help you decide on which career path you want to pursue.  Overall, the total OPEN jobs within these qualifications is currently at 1,254,503 jobs worldwide! Qualifications by Certifications  Qualifications by Specialization Qualifications for Directors and Managerial positions  Qualifications related to Information Security  Qualifications by Certifications The total job opening for these qualifications with certifications is at  127,190 job s! CISSP = 79,200 (Certified Information Systems Security Professional by ISC 2 ) CISA = 25,677 (Certified Information Syste

What is Data Privacy

 My InfoTech Journal:  Data Privacy What is Data Privacy? Data Privacy refers to the protection and secured handling of personal information during its lifecycle.  Data Privacy Laws have been enacted by the governments to ensure that personal information are protected and kept secured during its lifecycle. This starts from the collection of data, which requires the data collector to obtain consent from the individual prior to the collection, use, or disclosure of the personal information.  Individuals must also be able to review and update shared personal information, and the capacity to opt-out anytime. Data Privacy Laws Data Privacy Laws  have been enacted by the governments to ensure that personal information are secured and kept private during its lifecycle.  Here are samples of the Data Privacy Laws from different countries: General Data Protection Regulation (European Union) Data Protection Directive (European Union) Data Protection Act 2018 (United Kingdom) California Consumer P

Introduction to SOX Compliance

 My InfoTech Journal:  Introduction to SOX Compliance  Sarbanes-Oxley Act of 2002 is defined as “An Act to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws, and for other purposes.” 1 Sarbanes-Oxley Act  or more commonly known as  SOX , is a Federal Law which was enacted on 30-July-2002.  The Sarbanes-Oxley Act  was known in the US Senate as the “ Public Company Accounting Reform and Investor Protection Act ” and known in the US House as the “ Corporate and Auditing Accountability, Responsibility, and Transparency Act ”. This law was enacted as a response to a number of major corporate and accounting scandals including Enron and WorldCom. 2 The Sarbanes-Oxley Act  defined “ A violation by any person of this Act, any rule or regulation of the Commission issued under this Act, or any rule of the Board shall be treated for all purposes in the same manner as a violation of the Securities Exchange Act of 1934 (15

What is Endpoint Security

  My InfoTech Journal:  Endpoint Security  What Is Endpoint Security? Endpoint Security  refers to protecting your endpoint devices connected to your network from external threats targeting the vulnerabilities from these endpoint devices. Endpoint security is the practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited by malicious actors and campaigns. Endpoint security systems protect these endpoints on a network or in the cloud from cybersecurity threats. Endpoint security has evolved from traditional antivirus software to providing comprehensive protection from sophisticated malware and evolving zero-day threats.  1 Organizations of all sizes are at risk from nation-states, hacktivists, organized crime, and malicious and accidental insider threats. Endpoint security is often seen as cybersecurity's frontline, and represents one of the first places organizations look to secure their enterprise networks.