Minutes of Meeting: NISM/VI
Written by Yusuf on
Discussed
- We can reuse the result that we have done in the scanning
- We have listed 12 Threats, and each of us will need to claim 3 to work on
- Basic steps: which tools we use for the scanning, why, and the result of the scanning.
Next action
- Next meeting: next Monday at the same time
- Review our results (fully or partially) and discuss to ensure all of us are in the same direction
Explore more like this
NISM Reflection
As technology advances further, so do security issues. There is a correlation between cybercrimes and the growth of technology (Utica University, n.d.). New technologies mean new touchpoints for cybercriminals to...
Yusuf
30 May 2022
Evaluation of Assignment I & II
Doing the second assignment, where we started to get our hands to do the security audit, we found that it’s not easy to evaluate the site security without having the...
Yusuf
29 May 2022
Comments