Array ( [category_name] => networking-and-security [error] => [m] => [p] => 0 [post_parent] => [subpost] => [subpost_id] => [attachment] => [attachment_id] => 0 [name] => [static] => [pagename] => [page_id] => 0 [second] => [minute] => [hour] => [day] => 0 [monthnum] => 0 [year] => 0 [w] => 0 [tag] => [cat] => 3137 [tag_id] => [author] => [author_name] => [feed] => [tb] => [paged] => 1 [meta_key] => [meta_value] => [preview] => [s] => [sentence] => [title] => [fields] => [menu_order] => [embed] => [category__in] => Array ( ) [category__not_in] => Array ( ) [category__and] => Array ( ) [post__in] => Array ( ) [post__not_in] => Array ( ) [post_name__in] => Array ( ) [tag__in] => Array ( ) [tag__not_in] => Array ( ) [tag__and] => Array ( ) [tag_slug__in] => Array ( ) [tag_slug__and] => Array ( ) [post_parent__in] => Array ( ) [post_parent__not_in] => Array ( ) [author__in] => Array ( ) [author__not_in] => Array ( ) [ignore_sticky_posts] => [suppress_filters] => [cache_results] => 1 [update_post_term_cache] => 1 [lazy_load_term_meta] => 1 [update_post_meta_cache] => 1 [post_type] => [posts_per_page] => 10 [nopaging] => [comments_per_page] => 50 [no_found_rows] => [order] => DESC [orderby] => date )
Networking and Security

Learn about One-Time Passwords in CISSP

Now, let’s discuss One-Time Passwords. One-Time Passwords As its name implies, a one-time password (OTP) is a password that is valid only once. This is usually seen whenever very strong password authentication is needed. The most common uses for OTP are for authenticating to VPN, and online Internet banking systems. When using one-time passwords, if

Networking and Security

Learn about Biometrics in CISSP

Continuing our discussion on the authentication methods, we are going to talk about Biometrics. Biometrics Applying statistical analysis to biological data. The third category of authentication methods is the Biometrics. Using biometric methods is considered the strongest and most authentic identification and authentication approach. You will find this reasonable if you refer back to the

Networking and Security

Learn about Access Control in CISSP

As I told you earlier in this series when talking about categories of security countermeasures, there are three categories of countermeasures: administrative, physical, and logical (technical). By its definition, access control is also considered as a security countermeasure. It can be done administratively, physically, and/or technically. Administrative Access Control Access control can be implemented using

Networking and Security

Learn What is Access Control in CISSP

Welcome to Access Control; another important domain from the eight domains that the CISSP exam will challenge your knowledge in. And apart from the exam, understanding access control is essential for your work as a security professional. So, bring your coffee… and your attention as well. What is Access Control? Access control refers to the

Networking and Security

Learn Different Types of Policies and Procedures in CISSP

An organization should define its security plan. Security follows a top-down approach. In other words, the security strategy and scope are discussed, defined, and approved at the top level (top management). After being approved, they are propagated to the middle management, then to the team leaders, and finally to the executives to follow. The mentioned

Networking and Security

Learn About the Different Types of Risk Analysis in CISSP

In the previous article, we talked about the risk assessment process. The output of this process is a list of existing vulnerabilities, associated threats, and the resulting risks. Risk Analysis is then performed by studying each vulnerability, threat, and risk in more details to assess the amount of damage, and the possible countermeasures to use

Networking and Security

Learn about Risk Management in CISSP

Earlier in this series, we have defined risk as the possibility or chance that a threat agent would exploit an identified vulnerability to gain access, compromise security, or cause some sort of damage. One of your main responsibilities as a security officer is to train and help the people in your organization to learn how

Networking and Security

Learn about Security Governance in CISSP

Security is no longer considered to be some sort of luxury. Today, being adequately secure is vital for companies to survive and stay in the track of the wild market competition. Accordingly, organizations are now giving increased importance to the security-related issues. Each organization should have its own security program that reflects and ensures to

Networking and Security

Learn Different types of Security Controls in CISSP

After introducing the three categories of security countermeasures: technical, physical, and administrative, it is time to classify them according to their functional uses. An important article to read; so have a nice reading. Functional Use of Security Controls The functional use of a specific security countermeasure is the purpose or reason for choosing and implementing

Networking and Security

Learn the Commonly-Used Terms in CISSP

Before diving into details, and being flooded by huge number of new terms, I found it necessary to set up the base that we will be building upon in the next articles. So, this article is meant to get you familiar with essential principles and terms that you should be aware of. Have a nice