<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Kgosi Tshepo</title>
    <description>The latest articles on DEV Community by Kgosi Tshepo (@kgosi_tshepo).</description>
    <link>https://dev.to/kgosi_tshepo</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F73191%2F54c7038c-34d2-4acb-891a-4dfe199c4a4c.png</url>
      <title>DEV Community: Kgosi Tshepo</title>
      <link>https://dev.to/kgosi_tshepo</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/kgosi_tshepo"/>
    <language>en</language>
    <item>
      <title>What Exactly Do CyberSecurity Professionals Do 🤔?</title>
      <dc:creator>Kgosi Tshepo</dc:creator>
      <pubDate>Fri, 15 May 2020 00:57:35 +0000</pubDate>
      <link>https://dev.to/kgosi_tshepo/what-exactly-do-cybersecurity-professionals-do-2ao5</link>
      <guid>https://dev.to/kgosi_tshepo/what-exactly-do-cybersecurity-professionals-do-2ao5</guid>
      <description>&lt;p&gt;We've heard about them but we know little of what they do.They are often assumed to be the James Bond' of the internet, fighting the bad guys.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://i.giphy.com/media/zFVvRICqVAJri/giphy.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://i.giphy.com/media/zFVvRICqVAJri/giphy.gif" alt="James Bond"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In this blog post we'll go through some of the different roles typical to a cybersecurity organisation.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Chief Information Security Officer(CISO)&lt;/strong&gt; : A CISO is the head of Information Security Division and they drive the security strategy of the organisation. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Information Security Architect&lt;/strong&gt; : They have a deeper understanding of different layers of the system, security policies to put in place.Their role is very crucial during the early stages of security life cycle.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Information Security Analyst&lt;/strong&gt; : Performs information security assessments, analyses events, alerts and any information that could be useful to identify threats.At the end of the assessment a threat mitigation documentation is created.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Information Security Auditor&lt;/strong&gt; : Their role is to enforce security compliance, reduce risk, and manage potential security threats.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Software Engineer&lt;/strong&gt; : They create security software applications and they have extensive knowledge of programming languages and computer networks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Penetration Tester/Ethical Hacker&lt;/strong&gt; : They simulate cyber attacks on already established security systems and identify vulnerabilities before hackers can exploit them.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We'll leave it at that for now 😊!!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ML--ATgx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ooq5ht8pln65ovuv384i.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ML--ATgx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ooq5ht8pln65ovuv384i.gif" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>CIA Triad in Information Security 🔐</title>
      <dc:creator>Kgosi Tshepo</dc:creator>
      <pubDate>Tue, 12 May 2020 19:26:35 +0000</pubDate>
      <link>https://dev.to/kgosi_tshepo/cia-triad-in-information-security-54p5</link>
      <guid>https://dev.to/kgosi_tshepo/cia-triad-in-information-security-54p5</guid>
      <description>&lt;p&gt;How would you define information security when asked?&lt;/p&gt;

&lt;p&gt;I struggled at times to explain this.I would just say it is protection of information and hope that there isn't a follow up question 🥺!&lt;/p&gt;

&lt;p&gt;The reality is that the protection of information is governed by Confidentiality,Integrity and Availability popularly know as the CIA triad.&lt;/p&gt;

&lt;p&gt;Now let's drill down on each of these concepts👨🏽‍🔧&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Confidentiality : Ensures that information is only accessible to authorised entities.This can be enforced by using encryption mechanisms.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Integrity : Ensures that information remain consistent over it's entire life cycle - should not be changed in transit.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Availability : Speaks about ensuring that information remain always available on-demand.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Congratulations you can now flex to your buddies by explaining information security to them 🏌🏽‍♂️&lt;/p&gt;

&lt;p&gt;I hope you enjoyed this.Leave a comment and smash that follow button  to get notified when I post new content.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
  </channel>
</rss>
