Cyber Attacks

Security Operations Domain

2020-06-24T12:18:38+00:00Tags: , , , , , , , , , , , |

Security Operations Domain This domain represents 13 percent of the CISSP certification exam. The prime purpose of security operations practices is to safeguard information assets that reside in a system. Security operations represents routine operations that occur across many of the CISSP domains. Security operations practices help to identify threats and vulnerabilities and implement [...]

Security Assessment and Testing Domain

2020-06-23T09:17:39+00:00Tags: , , , , , , , , , , , , |

Security Assessment & Testing Domain This domain represents 12 percent of the CISSP certification exam. Security assessment and testing is based on designing, assessment and analyzing phases. The purpose of designing an interpretation and security assessment is to ensure that all security controls that have been implemented work properly. Assessment and testing are performed [...]

Security Architecture and Engineering Domain

2020-06-24T09:04:03+00:00Tags: , , , , , , , , , , , , , , , , , |

Security Architecture & Engineering Domain This domain cover the concepts, fundamental principles, basic architectures, and standards required to design a secure architecture. This domain represents 13 percent of the CISSP certification exam. The main topics in this domain are: Security models and concepts Information systems security models Security capabilities of information systems Vulnerabilities in [...]

Establish Handling Requirements

2020-07-16T06:52:24+00:00Tags: , , , , , , , , , , , |

Establish Handling Requirements Handling, sharing, and allowing access to an asset or a set of assets need to be ensured by the confidentiality, integrity, and availability requirements. In this part of this tutorial, we'll take a look at establishing handling requirements to help you understand the aspects of establishing handling. Appropriate policies and procedures [...]

Determine Data Security Controls

2020-07-16T06:43:19+00:00Tags: , , , , , , , , , , , , , , , , , , |

Determine Data Security Controls Data security controls employed by the states of data, standards, scoping, tailoring, and data protection methods. Data exists in one of three states: Data at rest: Data that lives in external or auxiliary storage devices, such as hard disk drives (HDDs), solid-state drives (SSDs), optical discs (CD/DVD), or even on [...]

Ensure Appropriate Retention

2020-07-16T06:49:37+00:00Tags: , , , , , , , , , , , , |

Ensuring Appropriate Retention One of the important aspects of cyber security is Ensure Appropriate Retention. In this part of this tutorial, we'll take a look at ensuring appropriate retention to help you understand the different aspects of appropriate retention. An asset in the form of data may store in digital media and hard. Data [...]

Protect Privacy

2020-07-16T06:56:12+00:00Tags: , , , , , , , , , , , , , |

Protect Privacy In this part of this tutorial, we'll take a look at protecting privacy to help you understand the different aspects of protecting privacy. One of the important aspects of cyber security is protecting privacy. The requirement for data privacy, is to share personal data securely to authorized parties depending upon the requirement. [...]

Determine and Maintain Ownership

2020-07-16T07:29:32+00:00Tags: , , , , , , , , , , , , , , , , |

Determine and Maintain Ownership In this part of this tutorial, we'll take a look at maintaining ownership to help you understand the different aspects of determine and maintain ownership. Each individual performs various roles in securing an organization’s assets. One of the important aspects of cyber security is maintaining ownership. Organizations should explicitly define [...]

Asset Security Domain

2020-07-15T14:13:23+00:00Tags: , , , , , , , , , , , , , , , , |

Asset Security Domain Review This domain focuses on protecting information assets. Information is the worthiest asset to an organization. The information’s value, determines the level of protection required by the organization. Asset security is one of most important the aspects of CISSP training course. A data classification scheme helps an organization assign a value [...]

Go to Top