Mohammad

November 18, 2023

Identifying the Roles of Data

It is worth exploring the many ways in which data is used on a daily basis to fully appreciate the value that data brings to every […]
February 11, 2023

General Overview of Healthcare Threats Based On ENISA Report

Threat sources are the other risk factors that must be taken into consideration when analysing risk. A threat source is characterized as: (i) the intent and […]
February 11, 2023

NIST Cybersecurity Framework

Understanding the NIST Framework’s components is crucial for implementing them in a layered security approach. The five Framework Core Functions are defined below. These Functions are […]
November 20, 2020

Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start writing!