Cyber Sentella

Cyber Sentella

Navigating the world of Cyber Security

Values

01

Confidentiality

Protecting sensitive information from unauthorized access. Confidentiality ensures that data is only available to those with the necessary permissions, typically through encryption and strict access controls.

02

Integrity

Ensuring the accuracy and consistency of data. Integrity prevents unauthorized alteration or destruction of information, ensuring that data remains reliable and unchanged during storage, transmission, or processing.

03

Availability

Ensure that information and systems are accessible to authorized users when needed. Maintain availability through measures like redundancy, backups, and disaster recovery planning to prevent downtime.

04

Accountability

Establishing responsibility for actions taken within an IT environment. Accountability ensures that users and systems can be traced and held responsible for their activities, typically through auditing and logging mechanisms.

05

Non-repudiation

Preventing individuals from denying their actions. Non-repudiation ensures that data, transactions, and communications are provable and traceable, often achieved through digital signatures and audit trails.

06

Resilience

Maintaining the ability to recover from and adapt to cyber threats. Resilience ensures organizations can bounce back from cyber incidents, minimizing disruption through robust recovery and response plans.

Lab Works

Explore my collection of hands-on projects that dive into the technical side of cybersecurity. From building and configuring home labs to coding challenges and reverse engineering, Lab Works showcases the practical experiments that drive my learning and professional growth in cybersecurity. Follow along as I tackle real-world scenarios and develop solutions to enhance security in digital environments.

With cyber threats evolving daily, protecting sensitive data, ensuring system integrity, and maintaining the availability of resources are paramount for individuals and organizations alike. From personal devices to enterprise networks, a comprehensive approach to security helps safeguard against breaches, data theft, and cyber-attacks. Staying informed and proactive is the key to navigating this complex digital environment.