Recently Updated Pages
Physical Security
Physical Security Controls Functional Order of Security Controls Stage Purpose Example ...
Threats & Countermeasures
Process Isolation: It's like giving each process its own private room. This ensures a process...
Cloud & Network Security
CASB (Cloud Access Security Broker) Definition: A CASB is a security solution that sits between ...
Technological Architectures
Microservices and Service Orientated Architecture (SOA) Service-Oriented Architecture (SOA) is a...
Frameworks
Common Criteria (CC) - ISO/IEC 15408 Overview: Provides a framework for the security evaluatio...
Introduction & New Concepts
Introduction to Key Concepts We will cover, at a high level, the following concepts which will b...
Think like a C-Suite
You may have heard the mantra "think like a manager" numerous times, be it from resources like Re...
Risk Analysis Formulas
Understanding Risks Analysis Formulas Risk analysis can be broken down into two primary methods....
Exam 2
1, add if you have time 10. The separation of network infrastructure from the control layer, c...
Summary
Introduction Security assessment and testing programs provide a mechanism for validating the ong...
Computer Crime and Investigations
Computer Crime in the Context of CISSP CISSP mainly focuses on US law. A computer crime is a vi...
Types of Law
Type of Law Standard Description Criminal Law Beyond a reasonable doubt Contai...
Threat Modeling
Supply Chain Risk Management (SCRM) Modern service delivery often involves a chain of multipl...
Software Development Concepts
SDLC Phase Steps Phase Name Description Mnemonic ⬇️ Requirements and Analysis In t...
Software Security and Threats
Change, Configuration, and Testing Change and Configuration Management Provides an organized ...
Identity, Access Management
Key Term Description Examples Subject Active participant that requests access. ...
Authentication & Access
Security Modes Multilevel Mode Designed for systems that handle data of varying classificatio...
Monitoring and Auditing
Log Files & Monitoring Log Files Purpose: Record data in databases or files. Types: Authen...
Advanced Technologies
Content Delivery Networks (CDN) A decentralized server network crafted to curtail delays when lo...
Network Architecture
Network Segmentation Definition: A strategy that divides a network into multiple segments or sub...