Skip to main content

Recently Updated Pages

Access Management and Operational Controls

CISSP Study Guide 7: Security Operations

Limiting Access & Damage Apply the Need-to-Know & Least Privilege theory: Limit access to dat...

Updated 1 year ago by Jack Waterhouse

Configuration and Vulnerability Management

CISSP Study Guide 7: Security Operations

Configuration & Change Management Helps in preventing incidents and outages. Configuratio...

Updated 1 year ago by Jack Waterhouse

Communication Models

CISSP Study Guide 4: Communication and Network Sec.

UDP/TCP While TCP focuses on reliability and comprehensive data communication, UDP aims for sp...

Updated 1 year ago by Jack Waterhouse

Network Security

CISSP Study Guide 4: Communication and Network Sec.

Intrusion Detection & Prevention Systems Intrusion Detection Systems (IDS) and Intrusion Prevent...

Updated 1 year ago by Jack Waterhouse

Asymmetric vs. Symmetric

CISSP Study Guide 3.1 Cryptography

In short, symmetric cryptography is faster and simpler but lacks scalability, has challenges with...

Updated 1 year ago by Jack Waterhouse

Advanced Network Concepts

CISSP Study Guide 4: Communication and Network Sec.

Synchronous vs Asynchronous Synchronous Communication: Relies on a timing or clocking mechani...

Updated 1 year ago by Jack Waterhouse

Types of Attacks

CISSP Study Guide 3.1 Cryptography

In the realm of cybersecurity, we often encounter various types of attacks. We'll dig deeper into...

Updated 1 year ago by Jack Waterhouse

BCP & DRP

CISSP Study Guide 7: Security Operations

Difference between BCP and DRP BCP (Business Continuity Planning): Focuses on the whole bu...

Updated 1 year ago by Jack Waterhouse

Cryptographic Systems

CISSP Study Guide 3.1 Cryptography

Post-Quantum Cryptography (PQC) PQC refers to cryptographic algorithms designed to be secure aga...

Updated 1 year ago by Jack Waterhouse

Database Concepts and Threats

CISSP Study Guide 8: Software Development Security

RDBMS Architecture Tables (relations): Comprises multiple attributes or fields. Each attribute c...

Updated 1 year ago by Jack Waterhouse

Introduction & Concepts

CISSP Study Guide 3.1 Cryptography

Understanding the core principles of cryptography is crucial in the journey towards CISSP certifi...

Updated 1 year ago by Jack Waterhouse

Security Controls

CISSP Study Guide 5: Identity and Access Management

Security Controls Overview Security controls can be: Implemented Via: Administratively ...

Updated 1 year ago by Jack Waterhouse

Computing Programs

CISSP Study Guide 2, 3: Security Architecture & Engineering

Grid Computing Grid computing, a subset of distributed computing, harnesses the power of many lo...

Updated 1 year ago by Jack Waterhouse

Domain 2: Asset Security

CISSP Study Guide 2, 3: Security Architecture & Engineering

Data Security Controls When preparing for your CISSP exam, the primary areas to focus on include...

Updated 1 year ago by Jack Waterhouse

Hashing vs. Encryption

CISSP Study Guide 3.1 Cryptography

In the previous pages, we covered discussed encryption as a bidirectional function. Note how encr...

Updated 1 year ago by Jack Waterhouse

Public Key Infrastructure (PKI)

CISSP Study Guide 3.1 Cryptography

Public Key Infrastructure (PKI) is an essential framework in cybersecurity that works like a digi...

Updated 1 year ago by Jack Waterhouse

Ciphers & Codes

CISSP Study Guide 3.1 Cryptography

This overview provides an introduction to the basic concepts of codes and ciphers, essential elem...

Updated 1 year ago by Jack Waterhouse

Intrusion Detection and Response

CISSP Study Guide 7: Security Operations

Intrusion Systems Intrusion Detection System (IDS) Response Mechanism Passive Response: Logs...

Updated 1 year ago by Jack Waterhouse

Access Control Attacks

CISSP Study Guide 5: Identity and Access Management

Common Attacks Spoofed Logon Screen Description: Fake login screen captures user credent...

Updated 1 year ago by Jack Waterhouse

Wireless & Cellular Networks

CISSP Study Guide 4: Communication and Network Sec.

Wireless Networks Li-Fi: Uses light for communication, boasting speeds that surpass Wi-Fi. ...

Updated 1 year ago by Jack Waterhouse