Blog Stats
- 75,850 hits
Monthly Archives: July 2013
14. Exam Essentials for Incident Management
Incident response steps are specifically listed in the CIB as: Detection Response Reporting Recovery Remediation and Review Once an incident is detected, the first response sohould be to limit or contain the scope fo the incident while protecting evidence. Based … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Incident Management
Comments Off on 14. Exam Essentials for Incident Management
13. Exam Essentials for Security Operations
Need to Know & The principle of least privilege are two standard IT security principles implemented in secure networks. They limit access to data and system so that users and other subjects have access only to what they require. When … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, security operations
Comments Off on 13. Exam Essentials for Security Operations
12. Exam Essentials for Security Architecture, Vulnerabilities, Threats, and Countermeasures
What is multitasking? It is the simultaneous execution of more than one application on a computer and is managed by the operating system. What is multithreading? Multithreading permits multiple concurrent tasks to be performed within a single process. Multiprocessing? It … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Security Architecture vulnerabilities threats and countermeasures
Comments Off on 12. Exam Essentials for Security Architecture, Vulnerabilities, Threats, and Countermeasures
Sergeant Major Jerry Gomes
My old friend and Marine brother moved up to Phoenix and came to hang out with my family and I. We haven’t seen each other since I got out of the Marine Corps in 1996. He and I were roommates … Continue reading
Posted in life
Comments Off on Sergeant Major Jerry Gomes
Leaving
As a contractor, performing the duties of an Operational Risk Consultant IV on the Enterprise Information Management (EIM) team at Wells Fargo, responsible for: • Completing information security foundation plans for applications, infrastructure and vendors. • Conducting discovery with Subject … Continue reading
Posted in life
Comments Off on Leaving
11. Exam Essentials for Principles of Security Models, Design, and Capabilities
know the details about each of the access control models and their functions: The state machine model ensures that all instances of subjects accessing objects are secure. The information flow model is designed to prevent unauthorized, insecure, or restricted information … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Principles of Security Models Design and Capabilities
Comments Off on 11. Exam Essentials for Principles of Security Models, Design, and Capabilities
Rob and Family
For Fourth of July we met Rob’s sister and mother. Yesterday we had a quick happy hour and then dinner to wish his sister, Debs, safe travels back to South Africa.
Posted in life
Comments Off on Rob and Family
Fourth of July 2013
We celebrated the fourth of July at our house with a bunch of friends. Click on a picture and use your right and left arrow keys to go through them all. We didn’t take many pictures though. [AFG_gallery id=’12’]
Posted in life
Comments Off on Fourth of July 2013
10. Exam Essentials for PKI and Cryptographic Applications
Asymmetric key cryptography is another way of saying public key encryption. Understand the key types used in asymmetric cryptography: public keys are freely shared whereas private keys are kept secret. to encrypt a message, the use the recipient’s public key. … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, PKI and Cryptographic Applications
Comments Off on 10. Exam Essentials for PKI and Cryptographic Applications