CISSP Security & Risk Management-Risk Analysis

Posted filed under CISSP.

Quantitative Analysis (ALE=SLE x ARO) ALE = Annualized Loss Expectancy (A dollar amount that estimates the loss potential from a risk in a span of year) SLE = Single Loss Expectancy (A dollar amount that is assigned to a single event that represents the company’s potential loss) ARO = Annualized Rate of Occurrence (Frequency of… Read more »

CISSP Security & Risk Management-The After-Action Review

Posted filed under CISSP.

  After-action review (AAR): a detailed examination of events that occurred from incident detection to recovery Identify areas of the BC/DR plans that worked, didn’t work, or need improvement AAR’s are conducted with all participants in attendance AAR is recorded for use as a training case AAR brings the BCP/DRP teams’ actions to a close

CISSP Security & Risk Management- Global Legal and Regulatory Issues

Posted filed under CISSP.

Computer/Cyber Crime CryptoLocker Ransomware – Spreads via email and propagates rapidly. Encrypts various file types and then a pop-up window appears to inform user about the actions performed on computer and, therefore demand a monetary payment for files to be decrypted.

CompTIA Network+ Common Security Threats

Posted filed under CompTIA Network+.

Source mc mcse Certification Resources     DoS (Denial of Service) – A DoS attack is a common type of attack in which false requests to a server overload it to the point that it is unable to handle valid requests, cause it to reset, or shut it down completely.

Types of Wireless Attacks Part 2

Posted filed under CompTIA Security+.

The Types of Wireless Attacks Part 2 CompTIA Security+ Objective 1.2 WPS Attacks Wi-Fi Protected Setup (WPS) allows users to configure a wireless network without typing in the passphrase. Instead, users can configure devices by pressing buttons or by entering a short personal identification number (PIN). For example, a user can configure a new wireless… Read more »

Types of Wireless Attacks

Posted filed under CompTIA Security+.

The Types of Wireless Attacks Part 1 CompTIA Security+ Objective 1.2 Replay Attacks A replay attack occurs when an attacker copies a stream of messages between two parties and replays the stream to one or more of the parties. Unless mitigated, the computers subject to the attack process the stream as legitimate messages, resulting in a range… Read more »

CompTIA and Immersive Labs Issue A Pen Test Challenge

Posted filed under CompTIA Security+.

CompTIA and Immersive Labs are challenging cybersecurity professionals in the United States and United Kingdom to test their penetration testing skills this month.   The two organizations launched the pen test challenge on the opening day of RSA® Conference 2019.   “Penetration testing, if done right, is a proven and valuable activity that all organizations… Read more »

Most Common Application/Service Attacks Part 2

Posted filed under CompTIA Security+.

   The nature of cyberattacks is constantly in flux, always evolving to keep pace with the times. Hacking of websites, theft of credit card information and other personal information has become an almost daily occurrence, along with illegal remittances via Internet banking. Recent years have witnessed the accelerating dissemination of new technologies such as IoT… Read more »

Most Common Application/Service Attacks Part 1

Posted filed under CompTIA Security+.

Richard Clarke, a former counter-terrorism expert for the United Government, once said, “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked”. While the latter is a tad harsh (we wouldn’t wish a cyber attack on anyone!), the former is certainly true.   If… Read more »

CompTIA Security+ Security Topologies

Posted filed under CompTIA Security+.

One of the most essential portions of information security is the design and topology of secure networks. What exactly do we mean by “topology?” Usually, a geographic diagram of a network comes to mind.

CompTIA Security+ Email and Application Security

Posted filed under CompTIA Security+.

Some of the Security+ exam will test you on your knowledge of some basic email, Internet, and application security issues. Although the amount of detail of knowledge that is required is quite minimal, you must still have a working knowledge of some simple email and application security concepts.

CompTIA Security+ Organizational Security

Posted filed under CompTIA Security+.

The Security Life Cycle

Physical Security Physical security refers to the aspects of information security that are related to physical threats, such as fire or natural disasters. We will cover some basic physical security threats below:

CompTIA Security+ Symmetric Key Cryptography

Posted filed under CompTIA Security+.

In here we will learn about different symmetric key algorithms and their key features. More importantly, we will learn about some more key concepts related to cryptography as it applies to both symmetric and asymmetric algorithms.

CompTIA Security+ Firewall

Posted filed under CompTIA Security+.

What is a Firewall? A firewall is any hardware or software designed to prevent unwanted network traffic. Some firewalls are simplistic in nature;

CompTIA Security+ Protocols

Posted filed under CompTIA Security+.

SNMP: It (SNMP) is a mainstream convention for system administration. It is utilized for gathering data from, and designing, system gadgets, for example, servers, printers, centers, switches, and switches on an Internet Protocol (IP) system.

CCNP Port Security

Posted filed under Cisco CCNP.

  In order to Prevent Man-In-Middle Attack we will use Port Security (for Example to secure Port f0/3)