Following
Mutual Friends
No mutual friends yet
Pinned Items
Recent Activities
  • adminsirkuremy updated the cover photo for ISO 27001
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy updated the picture of the group ISO 27001
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • 0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy created a new blog post, Access Rights
    Access Rights
     Access rights are permissions that are granted to a user, or an application, to view, modify or delete files in the network. These rights can be assigned to a particular client, server, folder, specific programs or data files.
    1. Continue Reading
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • Your favorite Cybersecurity Framework
    Posted on Thursday, 18 March 2021
    What is your favorite cybersecurity framework and why? ...
    1. View Discussion
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy created a new blog post, Access Profile
    Access Profile
     An access profile is accessibility information about a user that is stored on a computer. A profile includes the user's password, name and what information/systems they are allowed or denied access to.
    1. Continue Reading
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy updated a blog post
    Access Point
    An access point is a computer networking device which allows a Wi-Fi compliant device to connect to a wired network wirelessly. It usually connects via a router. It is frequently referred to as a WAP (wireless access point). 
    1. Continue Reading
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy updated a blog post
    Access Point
    An access point is a computer networking device which allows a Wi-Fi compliant device to connect to a wired network wirelessly. It usually connects via a router. It is frequently referred to as a WAP (wireless access point). 
    1. Continue Reading
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy created a new blog post, Access Point
    Access Point
    An access point is a computer networking device which allows a Wi-Fi compliant device to connect to a wired network wirelessly. It usually connects via a router. It is frequently referred to as a WAP (wireless access point). 
    1. Continue Reading
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy created a new blog post, Access Path
    Access Path
     An access path is a process where a specified quantity of material moves as a unit between work stations, while maintaining its unique identity. In database management system (RDBMS) terminology, access path refers to the path chosen by the system to retrieve data after a SQL request is executed.
    1. Continue Reading
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy updated a blog post
     Access control list (ACL) is a list of permissions attached to an object in a computer file. Each ACL contains a list of access control entries (ACE) that specifies which users or system processes are granted access, denied access or are audited for a securable object. What is an Access Control List? An access control list (ACL) contains rule...
    1. Continue Reading
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy updated a blog post
     Access control list (ACL) is a list of permissions attached to an object in a computer file. Each ACL contains a list of access control entries (ACE) that specifies which users or system processes are granted access, denied access or are audited for a securable object. What is an Access Control List? An access control list (ACL) contains rule...
    1. Continue Reading
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy updated a blog post
     Access control list (ACL) is a list of permissions attached to an object in a computer file. Each ACL contains a list of access control entries (ACE) that specifies which users or system processes are granted access, denied access or are audited for a securable object. What is an Access Control List? An access control list (ACL) contains rule...
    1. Continue Reading
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy updated a blog post
     Access control list (ACL) is a list of permissions attached to an object in a computer file. Each ACL contains a list of access control entries (ACE) that specifies which users or system processes are granted access, denied access or are audited for a securable object. What is an Access Control List? An access control list (ACL) contains rule...
    1. Continue Reading
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
  • adminsirkuremy created a new blog post, Access Control List (ACL)
     Access control list (ACL) is a list of permissions attached to an object in a computer file. Each ACL contains a list of access control entries (ACE) that specifies which users or system processes are granted access, denied access or are audited for a securable object. What is an Access Control List? An access control list (ACL) contains rule...
    1. Continue Reading
    0
    0
    0
    0
    0
    0
    Post is under moderation
    Stream item published successfully. Item will now be visible on your stream.
There are no activities here yet
Unable to load tooltip content.