Data protection

CISSP Cryptography – Bk2D3T6P1

Module Objectives Understand key terms associated with cryptography. Understand how security services such as confidentiality, integrity, authenticity, non-repudiation, and access control are addressed through cryptography. Understand basic cryptography concepts of symmetric and asymmetric. Describe hashing algorithms and digital signatures. Understand the importance of key management. Understand cryptanalysis methods. Cryptography Services The word cryptography has been derived from two Greek words. The word cryptos translates into the word secret, and the word graphy translates into the …

CISSP Cryptography – Bk2D3T6P1 Read More »

ISO-27001-Annex-A.15.1.2-Addressing-Security-Within-Supplier-Agreements

ISO 27001 Annex : A.15.1.2 Addressing Security Within Supplier Agreements & A.15.1.3 Information and Communication Technology Supply Chain

In this article explain ISO 27001 Annex : A.15.1.2 Addressing Security Within Supplier Agreements & A.15.1.3 Information and Communication Technology Supply Chain this controls. A.15.1.2  Addressing Security Within Supplier Agreements Control- Any suppliers that view, process, store, communicate or provide IT infrastructure component information for the organization should be defined and agreed with all applicable information security requirements. Implementation Guidance- Supplier agreements should be defined and recorded so that the organization and the supplier do …

ISO 27001 Annex : A.15.1.2 Addressing Security Within Supplier Agreements & A.15.1.3 Information and Communication Technology Supply Chain Read More »

Defense-in-depth

What is Defense in Depth? & How Defense in depth Works

Defense in depth may be a security strategy during which security professionals use many protection layers throughout associate information system. This strategy uses the military principle that it’s more difficult for associate enemy to defeat a fancy. Multi-layered defense system than to penetrate one barrier. Defense-in-depth helps to stop direct attacks against associate information system. It’s knowledge as a result of a possibility in one layer only leads the offender to successive layer. If a …

What is Defense in Depth? & How Defense in depth Works Read More »