November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,649 hits
Tag Archives: 2013
Confessions of a Cyber Spy Hunter
With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, … Continue reading
Posted in Security Blog
Tagged 2013, advanced persistent threat, APT, breach, computer security, cyber risk, cyber warfare, cybercrime, cyberwarfare, hacking, malware, Security Awareness, spy, ted, video tutorial, virus, warfare
Comments Off on Confessions of a Cyber Spy Hunter
Scottrade Breach
“Cybercriminals had unauthorized access to our network for a period of several months between late 2013 and early 2014” According to a Cyber Security Alert page on Scottrade, Federal investigators found indicators that prove Scottrade’s network and systems was used. … Continue reading
Posted in Security Blog
Tagged 2013, 2014, 2015, breach, cybercrime, hacked, information security, phishing, Scottrade, social engineering
Comments Off on Scottrade Breach
19. Exam Essentials for Physical Security
Without control over the physical environment, you can’t have adequate security with as much administrative or technical/logical control you through at it. If a malicious person can gain physical access to your facility or equipment, they can do whatever they … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Physical Security
Comments Off on 19. Exam Essentials for Physical Security
18. Exam Essentials for Incidents and Ethics
Computer crime is a crime that is directed against, or directly involves, a computer. Computer crimes are grouped into six categories: military, business, financial, terrorist, grudge, and thrill. As soon as you discover an incident, you must being to collect … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Incidents and Ethics
Comments Off on 18. Exam Essentials for Incidents and Ethics
17. Exam Essentials for Laws, Regulations, and Compliance
The differences between criminal law, civil law,and administrative law are: Criminal law protects society against acts that violate the basic principles we believe in. Violations of criminal law are prosecuted by federal and state governments. Civil law provides the framework … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Laws Regulations and Compliance
Comments Off on 17. Exam Essentials for Laws, Regulations, and Compliance
16. Exam Essentials for Disaster Recovery Planning
Natural disasters that commonly threaten organizations include earthquakes, floods, storms, fires, tsunamis, and volcanic eruptions. Explosions, electrical fires, terrorist acts, power outages, other utility failures, infrastructure failures, hardware/software failures, labor difficulties, theft, and vandalism are all common man-made disasters. The … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Disaster Recovery Planning
Comments Off on 16. Exam Essentials for Disaster Recovery Planning
15. Exam Essentials for Business Continuity Planning
Business continuity planning involves four distinct phases: project scope and planning, business impact assessment, continuity planning, and approval and implementation. Each task contributes to the overall goal of ensuring that business operations continue uninterrupted in the face of an emergency … Continue reading
Posted in CISSP-Study
Tagged 2013, Business Continuity Planning, CISSP Study Requirements
Comments Off on 15. Exam Essentials for Business Continuity Planning
14. Exam Essentials for Incident Management
Incident response steps are specifically listed in the CIB as: Detection Response Reporting Recovery Remediation and Review Once an incident is detected, the first response sohould be to limit or contain the scope fo the incident while protecting evidence. Based … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Incident Management
Comments Off on 14. Exam Essentials for Incident Management
13. Exam Essentials for Security Operations
Need to Know & The principle of least privilege are two standard IT security principles implemented in secure networks. They limit access to data and system so that users and other subjects have access only to what they require. When … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, security operations
Comments Off on 13. Exam Essentials for Security Operations
12. Exam Essentials for Security Architecture, Vulnerabilities, Threats, and Countermeasures
What is multitasking? It is the simultaneous execution of more than one application on a computer and is managed by the operating system. What is multithreading? Multithreading permits multiple concurrent tasks to be performed within a single process. Multiprocessing? It … Continue reading
Posted in CISSP-Study
Tagged 2013, CISSP Study Requirements, Security Architecture vulnerabilities threats and countermeasures
Comments Off on 12. Exam Essentials for Security Architecture, Vulnerabilities, Threats, and Countermeasures