Tag Archives: 2013

Confessions of a Cyber Spy Hunter

With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Confessions of a Cyber Spy Hunter

Scottrade Breach

“Cybercriminals had unauthorized access to our network for a period of several months between late 2013 and early 2014” According to a Cyber Security Alert page on Scottrade, Federal investigators found indicators that prove Scottrade’s network and systems was used. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Scottrade Breach

19. Exam Essentials for Physical Security

Without control over the physical environment, you can’t have adequate security with as much administrative or technical/logical control you through at it. If a malicious person can gain physical access to your facility or equipment, they can do whatever they … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 19. Exam Essentials for Physical Security

18. Exam Essentials for Incidents and Ethics

Computer crime is a crime that is directed against, or directly involves, a computer. Computer crimes are grouped into six categories: military, business, financial, terrorist, grudge, and thrill. As soon as you discover an incident, you must being to collect … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 18. Exam Essentials for Incidents and Ethics

17. Exam Essentials for Laws, Regulations, and Compliance

The differences between criminal law, civil law,and administrative law are: Criminal law protects society against acts that violate the basic principles we believe in. Violations of criminal law are prosecuted by federal and state governments. Civil law provides the framework … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 17. Exam Essentials for Laws, Regulations, and Compliance

16. Exam Essentials for Disaster Recovery Planning

Natural disasters that commonly threaten organizations include earthquakes, floods, storms, fires, tsunamis, and volcanic eruptions. Explosions, electrical fires, terrorist acts, power outages, other utility failures, infrastructure failures, hardware/software failures, labor difficulties, theft, and vandalism are all common man-made disasters. The … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 16. Exam Essentials for Disaster Recovery Planning

15. Exam Essentials for Business Continuity Planning

Business continuity planning involves four distinct phases: project scope and planning, business impact assessment, continuity planning, and approval and implementation. Each task contributes to the overall goal of ensuring that business operations continue uninterrupted in the face of an emergency … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 15. Exam Essentials for Business Continuity Planning

14. Exam Essentials for Incident Management

Incident response steps are specifically listed in the CIB as: Detection Response Reporting Recovery Remediation and Review Once an incident is detected, the first response sohould be to limit or contain the scope fo the incident while protecting evidence. Based … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 14. Exam Essentials for Incident Management

13. Exam Essentials for Security Operations

Need to Know & The principle of least privilege are two standard IT security principles implemented in secure networks. They limit access to data and system so that users and other subjects have access only to what they require. When … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 13. Exam Essentials for Security Operations

12. Exam Essentials for Security Architecture, Vulnerabilities, Threats, and Countermeasures

What is multitasking? It is the simultaneous execution of more than one application on a computer and is managed by the operating system. What is multithreading? Multithreading permits multiple concurrent tasks to be performed within a single process. Multiprocessing? It … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 12. Exam Essentials for Security Architecture, Vulnerabilities, Threats, and Countermeasures