Monthly Archives: July 2013

14. Exam Essentials for Incident Management

Incident response steps are specifically listed in the CIB as: Detection Response Reporting Recovery Remediation and Review Once an incident is detected, the first response sohould be to limit or contain the scope fo the incident while protecting evidence. Based … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 14. Exam Essentials for Incident Management

13. Exam Essentials for Security Operations

Need to Know & The principle of least privilege are two standard IT security principles implemented in secure networks. They limit access to data and system so that users and other subjects have access only to what they require. When … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 13. Exam Essentials for Security Operations

12. Exam Essentials for Security Architecture, Vulnerabilities, Threats, and Countermeasures

What is multitasking? It is the simultaneous execution of more than one application on a computer and is managed by the operating system. What is multithreading? Multithreading permits multiple concurrent tasks to be performed within a single process. Multiprocessing? It … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 12. Exam Essentials for Security Architecture, Vulnerabilities, Threats, and Countermeasures

Sergeant Major Jerry Gomes

My old friend and Marine brother moved up to Phoenix and came to hang out with my family and I. We haven’t seen each other since I got out of the Marine Corps in 1996. He and I were roommates … Continue reading

Posted in life | Comments Off on Sergeant Major Jerry Gomes

Leaving

As a contractor, performing the duties of an Operational Risk Consultant IV on the Enterprise Information Management (EIM) team at Wells Fargo, responsible for: • Completing information security foundation plans for applications, infrastructure and vendors. • Conducting discovery with Subject … Continue reading

Posted in life | Comments Off on Leaving

11. Exam Essentials for Principles of Security Models, Design, and Capabilities

know the details about each of the access control models and their functions: The state machine model ensures that all instances of subjects accessing objects are secure. The information flow model is designed to prevent unauthorized, insecure, or restricted information … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 11. Exam Essentials for Principles of Security Models, Design, and Capabilities

Rob and Family

For Fourth of July we met Rob’s sister and mother. Yesterday we had a quick happy hour and then dinner to wish his sister, Debs, safe travels back to South Africa.

Posted in life | Comments Off on Rob and Family

Fourth of July 2013

We celebrated the fourth of July at our house with a bunch of friends. Click on a picture and use your right and left arrow keys to go through them all. We didn’t take many pictures though. [AFG_gallery id=’12’]

Posted in life | Comments Off on Fourth of July 2013

10. Exam Essentials for PKI and Cryptographic Applications

Asymmetric key cryptography is another way of saying public key encryption. Understand the key types used in asymmetric cryptography: public keys are freely shared whereas private keys are kept secret. to encrypt a message, the use the recipient’s public key. … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 10. Exam Essentials for PKI and Cryptographic Applications