CISSP-Training

Cryptography- Part 2

2020-07-15T13:29:55+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Cryptography- Part 2 Asymmetric Cryptography / Public Key Cryptography In this method, two keys are used: Private Key: This key is only known by the owner itself. Public key: This key is issued by using Public Key Infrastructure (PKI) where a trusted Certification Authority (CA) certifies the ownership of key pairs. Only the private [...]

Cryptography- Part 1

2020-07-15T13:19:32+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Cryptography- Part 1 This page we discuss cryptography, concepts, algorithms, attacks, and management. The sensitivity of assets is determined by confidentiality and integrity requirements and the impact of compromise on the corporation. Cryptography is the science of encrypting and decrypting communications to make them unintelligible for all but the intended recipient. Cryptography used to [...]

Assessing & Mitigating Vulnerabilities of Embedded Devices

2020-07-16T07:49:58+00:00Tags: , , , , , , , , , , , , , , |

Assessing & Mitigating Vulnerabilities of Embedded Devices Embedded devices or embedded computer systems are the computing system specially designed for a dedicated purpose with the mechanical and electrical system. These embedded systems may have internet connectivity. An example of the embedded system commonly used for general purposes are: Digital Watches Automobiles and other vehicles [...]

Assessing & Mitigating Vulnerabilities of Mobile Systems

2020-07-15T13:03:26+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Assessing & Mitigating Vulnerabilities of Mobile Systems These days, one of the most important aspects of cyber security is the ability to secure mobile systems. Smartphones available in the market are running on different popular Operating systems such as iOS, Blackberry OS, Android, Symbian, and Windows, etc. All of these have an online store for [...]

Assessing & Mitigating Vulnerabilities of Web Systems

2020-07-15T13:06:11+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Assessing & Mitigating Vulnerabilities of Web Systems Web Servers are the programs that are used for hosting websites. Web servers may be deployed on a separate web server hardware or installed on a host as a program. One of the most important aspects of cyber security is the ability to secure web systems. This [...]

Vulnerability Assessment & Mitigating Vulnerabilities of Security Architectures- Part II

2020-07-15T14:09:37+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Assessing & Mitigating Vulnerabilities of Security Architectures- Part II (IoT) Cloud-based systems Cloud Computing eliminates the need for on-premises devices by renting a virtual machine hosted by a trusted third-party. This remote computing enhances the efficiency, performance, scalability, and security. There are three different models for cloud computing: Iaas (Infrastructure as a service): Instead [...]

Vulnerability Assessment & Mitigating Vulnerabilities of Security Architectures- Part I

2020-07-15T14:06:35+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Vulnerability Assessment & Mitigating Vulnerabilities of Security Architectures- Part I One of the most important topics in CISSP course is vulnerability assessment. In this section, we discuss the techniques used to identify and fix vulnerabilities in systems. Server-Client based systems We begin the discussion of vulnerability assessment by talking about various aspects of Server-Client [...]

Security Capabilities of Information Systems

2020-07-15T13:57:00+00:00Tags: , , , , , , , , , , , , , , , , , |

Security Capabilities of Information Systems Security Capabilities of Information Systems are of important aspects of CISSP training course. In this section, we focus on Memory Protection, Trusted Platform Module (TPM) and Encryption / Decryption. Memory Protection Information Systems are  very important. So Memory Protection is an important security concept associated. Memory in a computer [...]

Controls for Systems Security Requirements

2020-07-15T13:09:15+00:00Tags: , , , , , , , , , , , , , |

Controls for Systems Security Requirements Building secure software is critical to information security. Also the systems that software runs on must themselves be securely designed and built. In order to evaluate any program or system, technical evaluation evaluates the performance and security-related capabilities. They are also compared with other competing products to evaluate different [...]

Go to Top