CISSP Security & Risk Management-Risk Analysis

Posted by & filed under CISSP.

Quantitative Analysis (ALE=SLE x ARO) ALE = Annualized Loss Expectancy (A dollar amount that estimates the loss potential from a risk in a span of year) SLE = Single Loss Expectancy (A dollar amount that is assigned to a single event that represents the company’s potential loss) ARO = Annualized Rate of Occurrence (Frequency of… Read more »

CISSP Security & Risk Management-The After-Action Review

Posted by & filed under CISSP.

  After-action review (AAR): a detailed examination of events that occurred from incident detection to recovery Identify areas of the BC/DR plans that worked, didn’t work, or need improvement AAR’s are conducted with all participants in attendance AAR is recorded for use as a training case AAR brings the BCP/DRP teams’ actions to a close

CISSP Security & Risk Management- Global Legal and Regulatory Issues

Posted by & filed under CISSP.

Computer/Cyber Crime CryptoLocker Ransomware – Spreads via email and propagates rapidly. Encrypts various file types and then a pop-up window appears to inform user about the actions performed on computer and, therefore demand a monetary payment for files to be decrypted.

CISSP Security & Risk Management- Computer Crimes

Posted by & filed under CISSP.

Computer as incidental to other crimes Involves crimes where computers are not really necessary for such crimes to be committed. Instead computers facilitate these crimes and make them difficult to detect. Examples of crimes in this category may include money laundering and unlawful activities on bulletin board systems.

CISSP Telecommunications and Network-Tunneling Protocols

Posted by & filed under CISSP.

Tunneling is a method of transferring data from one network to another by encapsulating the packets  in an additional header. The additional header provides routing information so that the encapsulating payload traverse the intermediate networks.

CISSP Telecommunications and Network Security-IPSec

Posted by & filed under CISSP.

 IPSec IPSec is an architecture or framework for security services for IP networks. It works at the Network Layer of the OSI Model. It is actually a standard for secure data transmission. It provides mechanisms for authentication and encryption. Defined by RFC 4301 and carries a set of functions, it is mandatory in IPv6. IPSec… Read more »

CISSP WANS and Their Components

Posted by & filed under CISSP.

WANS and Their Components Wide area networks (WANs) are considerably different than LANs. Organizations usually own their own LANs, but WAN services are typically leased; it’s not feasible to have your network guy run a cable from New York to Dallas.

Exin ITIL Continual Service Improvement

Posted by & filed under Exin ITIL.

 [bs_icon name=”glyphicon glyphicon-chevron-right”] The Role of Measurement Measurement plays a critical role within ITIL®, both as a part of Continual Service Improvement, but also within Service Level Management and as an essential part of all processes. Measurements can be used for four basic purposes as shown below:

Exin ITIL Service Operation Processes

Posted by & filed under Exin ITIL.

[bs_icon name=”glyphicon glyphicon-chevron-right”] Incident Management Incident Management is concerned with the rapid restoration of services and with minimization of impact to the business.

Exin ITIL Service Operation

Posted by & filed under Exin ITIL.

Service Operation   [bs_icon name=”glyphicon glyphicon-chevron-right”] Overview The Service Operation phase of the Service Lifecycle is concerned with ensuring that services operate within agreed parameters. When service interruptions do occur, Service Operation is charged with restoring service as quickly as possible and with minimizing the impact to the business.   [bs_icon name=”glyphicon glyphicon-chevron-right”] Business Value… Read more »

Exin ITIL Change Management

Posted by & filed under Exin ITIL.

  Service Transition Processes [bs_icon name=”glyphicon glyphicon-chevron-right”]  Change Management   Change Management is concerned with recording, evaluating, approving, testing, and reviewing changes to services, systems, and other Configuration Items.

Exin ITIL Concepts and Models

Posted by & filed under Exin ITIL.

[bs_icon name=”glyphicon glyphicon-chevron-right”] Change Authority  In ITIL® the entity charged with approval of a Request for Change is called the Change Authority.

Exin ITIL Capacity Management

Posted by & filed under Exin ITIL.

Capacity Management

Capacity Management is concerned with ensuring that cost-effective capacity exists at all times which meets or exceeds the agreed needs of the business as established in Service Level Agreements.

Exin ITIL The RACI Model

Posted by & filed under Exin ITIL.

ITIL also utilizes the RACI model as a generic tool for reviewing and assigning four key roles to any important task or activity.