availability

CISSP Security and Risk Management – Bk2D1

Overview Security and Risk Management in this Domain 1 of the (ISC)2®  CBK lays the foundation for the entire course, introducing  concepts and principles that will  be utilized  throughout. It is imperative that the candidate learn and understand these thoroughly, if the candidate is not already familiar with the material from professional practice. NOTE: Throughout this domain and much of the rest of the course material, the term “organization” will be used to describe operational entities; …

CISSP Security and Risk Management – Bk2D1 Read More »

CISSP Implement Site and Facility Security Controls – Bk1D3T11

Implement Site and Facility Security Controls in this all the thought and effort put into ensuring that the operation of your systems protects  the confidentiality, integrity, and availability of your data is for naught if the threat actor can simply walk into your data center and walk out with the disk drives. Designing a data center or engaging the services of a third-party data center requires careful consideration of the risks and appropriate controls to …

CISSP Implement Site and Facility Security Controls – Bk1D3T11 Read More »

CISSP Understand the Fundamental Concepts of Security Models – Bk1D3T2

A Security models is a hypothetical abstraction of a system, simplified to enable analysis of certain aspects of the system without the complexity and details of the entire system being analyzed. A security model is a model that deals with security policy. Security models can be formal, intended for mathematical analysis to assist in the verification that a system complies with a specific policy, or they can be informal, serving to illustrate and simplify the …

CISSP Understand the Fundamental Concepts of Security Models – Bk1D3T2 Read More »

CISSP Understand and Apply Concepts of Confidentiality, Integrity, and Availability -Bk1D1T1

For thousands of years, people have sought assurance that information has been captured, stored, communicated, and used securely. Depending on the context, differing levels of emphasis have been placed on the availability, integrity, and confidentiality of information, but achieving these basic objectives has always been at the heart of security practice. As we moved from the time of mud tablets and papyrus scrolls into the digital era, we watched the evolution of technology to support …

CISSP Understand and Apply Concepts of Confidentiality, Integrity, and Availability -Bk1D1T1 Read More »

Overview of an Amazon Virtual Private Cloud

Overview of an Amazon Virtual Private Cloud

Overview of an Amazon Virtual Private Cloud Virtual service provides the networking layer of EC2. A VPC is a virtual network that can contain EC2 instances as well as network resources for other AWS services. By default, every VPC is isolated from all other networks. You can, however, connect your VPC to other networks, including the Internet and other VPCs. In addition to EC2, VPCs are foundational to many AWS services, so understanding how they …

Overview of an Amazon Virtual Private Cloud Read More »

Top-5-Key-Elements-of-an-Information-Security

Top 5 Key Elements of an Information Security

Top 5 Key Elements of an Information Security and its critical elements, including systems and hardware that use, store, and transmit that information. Necessary tools: policy, awareness, training, education, technology etc. IS is the application of measures to ensure the safety and privacy of data by managing its storage and distribution. Information security has both technical and also social implications. Information security system is the process of protecting and securing the data from unauthorized access, …

Top 5 Key Elements of an Information Security Read More »