The allocation of funds in cybersecurity technology is a difficult task to complete as there’s many things to fund, and not much funds to properly provide for them all. As a Chief of information security, the first step I would… Continue Reading →
In this assignment, I will be defining the CIA triad. I will be going over topics like the componentsof CIA and what they stand for. I also will be listing the differences between authentication andauthorization. What is the CIA triad?… Continue Reading →
© 2026 Kevon Merritte's Portfolio — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑