Blog Stats
- 75,561 hits
Monthly Archives: June 2013
9. Exam Essentials for Cryptography and Symmetric Key Algorithms
Understand the role that confidentiality, integrity, and nonrepudiation play in cryptosystems. Know how cryptosystems can be used to achieve authentication goals by providing assurances as to the identity of the user. one possible scheme that uses authentication is the challenge-response … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Cryptography and Symmetric Key Algorithms
Comments Off on 9. Exam Essentials for Cryptography and Symmetric Key Algorithms
Supermoon
Jaime took these awesome pictures of the supermoon. Here is a cool article on “the supermoon“
Posted in life
Comments Off on Supermoon
8. Exam Essentials for Malicious Code and Application Attacks
Understand the propagation techniques used by viruses. File Inflection, service injection, boot sector infection, macro infection. Most antivirus programs use signature-based detection algorithms to look for telltale patterns of known viruses. It’s essential to update virus definition files in order … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Malicious Code and Application Attacks
Comments Off on 8. Exam Essentials for Malicious Code and Application Attacks
Father’s Day 2013
We watched Man of Steel today. For Father’s Day, my wife got me some awesome motorcycle mesh overpants. Perfect for my drive back and forth from work. As another gift, look what my son and I did!
Posted in life
Comments Off on Father’s Day 2013
7. Exam Essentials for Software Development Security
Describe the functioning of viruses, worms, trojan horses and logic bombs. Viruses: oldest form of malicious code objects. Trojan Horses: Cover application with secret, usually malicious, payload. Logic bombs: Dormant malicious code that awaits for an event to trigger. Worms:A … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Software Development Security
Comments Off on 7. Exam Essentials for Software Development Security
6. Exam Essentials for Risk and Personnel Management
3rd party governance is the system of oversight that may be mandated by law, regulation, industry standards, or licensing requirements. Overall risk management is the process of identifying factors that could damage or disclose data, evaluating those factors in light … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Risk and Personnel Management
Comments Off on 6. Exam Essentials for Risk and Personnel Management
We Bought a Boat!!!
Yes, it’s true. It was a deal we couldn’t pass up and it didn’t break the bank. We did talk about how we should probably buy a truck first, but we honestly couldn’t pass this up. We hope to take … Continue reading
Posted in life
Comments Off on We Bought a Boat!!!
5. Exam Essentials for Security Governance Concepts, Principles and Policies
Primary goals are contained in the CIA. The three principles are considered the most important within the realm of security. Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Security Governance Concepts Principles and Policies
Comments Off on 5. Exam Essentials for Security Governance Concepts, Principles and Policies