top of page

Search
Assessing PCI DSS Requirement 8
Assessing PCI DSS Requirement 8: Secure Passwords for Organizations Processing Credit Card Data Credit card information is a top target...
Steven Belanger
Oct 24, 20233 min read
2 views
0 comments
The Importance of Risk Management
The Importance of Risk Management in Cyber Security Assessments and Audits In today's digital age, the risk of cyber-attacks and data...
Steven Belanger
Oct 24, 20232 min read
2 views
0 comments
The Importance of Auditing
The Importance of Auditing: A Comparative Analysis of Internal and External Audits IT auditing is the process of assessing a company's...
Steven Belanger
Oct 24, 20233 min read
2 views
0 comments
CyberGreen: A fictional Case Study
In this case study, I am creating an organization called "CyberGreen," which is a non-profit that focuses on cybersecurity and digital...
Steven Belanger
May 8, 20237 min read
0 views
0 comments
Red Team Effectiveness in the TSA Screening Process
Based on the audit report, the red team exercise conducted by the Department of Homeland Security (DHS) was not effective in identifying...
Steven Belanger
May 8, 20232 min read
0 views
0 comments
How often should you or your organization perform a risk assessment?
Risk assessments are an important part of any organization's risk management process. They help identify potential risks and...
Steven Belanger
May 8, 20232 min read
0 views
0 comments
DAC: Discretionary Access Control
The DAC (Discretionary Access Control) control model is a type of access control mechanism used to restrict access to resources based on...
Steven Belanger
May 8, 20232 min read
0 views
0 comments
Best Practices for Implementing Biometric Controls
To minimize errors and concerns during the implementation of biometric controls, organizations should adhere to best practices such as:...
Steven Belanger
May 8, 20232 min read
1 view
0 comments
Encryption Vs. Cryptography
Encryption and cryptography are two methods used in IT security to protect sensitive data and secure access control. Encryption refers to...
Steven Belanger
May 8, 20231 min read
0 views
0 comments
Multi-layer Access Control at my Current Organization
So I currently work for Walmart and multifactor authentication is used as one layer of their multilayer access control. When an employee...
Steven Belanger
May 8, 20231 min read
0 views
0 comments
ABS Financial Solutions Scenario Analysis and Federal and State Compliance Laws
In the instance of ABS Financial Solutions, compliance laws had a big impact on how the company resolved its operational issue. The...
Steven Belanger
May 8, 20232 min read
1 view
0 comments
How does an organization ensure CIA triad of access control systems?
The information technology infrastructure of any company must include access control systems. They are in charge of making sure that only...
Steven Belanger
May 8, 20232 min read
2 views
0 comments
Access Control Situations: Review information from the reading assignment that pertains to identific
An essential idea in computer security is access control, which entails limiting who has access to what data or resources....
Steven Belanger
May 8, 20232 min read
0 views
0 comments
OWASP Cheat Sheet - Multi-Factor Authentication
For this topic, I've chosen Multi-Factor Authentication. Multi-factor (aka. Two-Factor or 2FA) authenticaiton is when a user is must use...
Steven Belanger
Nov 1, 20211 min read
0 views
0 comments
What is the difference between a syntax, logic, and runtime error?
Syntax Error is, as the name suggests, an error in the syntax of a sequence of characters or tokens that are intended to be written in...
Steven Belanger
Oct 23, 20211 min read
0 views
0 comments


How loops can be utilized in list processing; Python Example
A list is created by first naming the list. In this case, we will use "shoppinglist". You would then create a relationship to the list...
Steven Belanger
Oct 23, 20211 min read
0 views
0 comments
Defining a function in Python and returning a value.
In order to define a function, your function block should begin with the defkeyword. This would then be followed by the function name...
Steven Belanger
Oct 23, 20211 min read
0 views
0 comments


Why and when to use a for loop versus a while loop in programming?
Typically, you would use a for loop when you know how many times you would like the loop to run. An example would be Topic #1 of this...
Steven Belanger
Oct 23, 20211 min read
0 views
0 comments
What are Meta-characters in Linux Shells (With Examples)
Meta-characters are special characters used in Linux shells to interpret a command. An example of a meta-character would be the '#' (or...
Steven Belanger
Oct 23, 20211 min read
0 views
0 comments
Change Mod (chmod) command in Linux OS
The chmod, or change mode, is the command used to change the mode (permissions) of files or directories. Using the chmod requires at...
Steven Belanger
Oct 23, 20211 min read
0 views
0 comments
bottom of page