admin

  • admin started the topic Domain 3 – Security Engineer in the forum CISSP 7 months ago

    Important topics

    Symmetric Encryption : It will use only one key for encryption and decryption, process is faster as it using single key for encryption and decryption.
    Asymmetric Encryption : It uses two different key for encryption and decryption , process is some what slow comparing to Asymmetric Encryption.
    Hash Function : its an encryption…[Read more]

  • ILOVEYOU 0r love letter Virus

    Its started as E-mail ,subject content will be a love-letter-for-you.txt but its actually a vbs script, when the receiver start click this script, the script will start execute and […]

  • admin started the topic Domain 2 – Asset Security in the forum CISSP 7 months ago

    Important Definition Asset Security

    This chapter give detail information how to secure our asset Physical as well data assets.

    RAM – Random Access Memory ,its fast in process but its losses its memory once power down. its mainly used in fetching and executing purpose
    SRAM – Static Random access memory, its a fast processing memory and its very…[Read more]

  • If all the devices are virtualized, how about the Networking will be done in an virtualized environment. Present Networking technology mainly focused on Physical devices, so there is a need for network […]

  • admin started the topic Legal System and Main Laws in the forum CISSP 7 months ago

    Major Legal System

    Common law – Common law is court decide a single case, when the parties disagreed what the law is, most of the cissp will cover common law only, it’s commonly used in US and UK, and most of the British ruled countries.
    Religious law – its third legal body, its laws mainly based on law said by their religions.

    Civil law -…[Read more]

  • admin started the topic Legal Sysem and Main Laws in the forum CISSP 7 months ago

    Major Legal System

    Common law – Common law is court decide a single case, when the parties disagreed what the law is, most of the cissp will cover common law only, it’s commonly used in US and UK, and most of the British ruled countries.
    Religious law – its third legal body, its laws mainly based on law said by their religions.

    Civil law -…[Read more]

  • Data Ownership Includes from Creation of Sensitive data ,labelling, protecting.

    Senior Management – Responsible for creating Information Security Program, labelling ,staffing, funding and prioritizing their data security.
    Data Owners – they are managers of data , Normally senior managers are the data owners, they will create…[Read more]

  • All the famous social media become end-to-end encrypted now a day’s, It was started used by telegram first and all other social media messaging software started following it. WhatsApp, Viber, Facebook messenger […]

  • IT industries had went a lot  changes for the past ten years, traditional data center had moved to clouding, data storage is changed, entry of mobile application, resulted in BYOD services and great demand of Big […]

  • (function(i,s,o,g,r,a,m){i[‘GoogleAnalyticsObject’]=r;i[r]=i[r]||function(){
    (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
    m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
    })(window,document,’script’,’https://www.google-analytics.com/analytics.js’,’ga’);

    ga(‘create’,…[Read more]

  • its first domain in CISSP ,it covers main information Security concept ,type of laws ,legal and regulatory issues, Code of ethics, 3rd contract, risk analysis and types of attackers.

    Main definition and brief of terms

    Confidentiality : Keeping the data in Secret, Preventing from Unauthorized users Access.
    Integrity : data Should not be modified…[Read more]

  • (function(i,s,o,g,r,a,m){i[‘GoogleAnalyticsObject’]=r;i[r]=i[r]||function(){
    (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), […]

  • from your details, I understood that you should 10.19.1.X should be allowed in IPSEC tunnel of both the end. If remote access VPN is configured you only have to access on the Forticlient and FrotiGATE local ranges.

    Just Add another Phase2 ip ranges in the Same IPSEC Tunnel source will 10.19.1.X and destination will be 10.50.1.x

    in IP sec remote…[Read more]

  • (function(i,s,o,g,r,a,m){i[‘GoogleAnalyticsObject’]=r;i[r]=i[r]||function(){
    (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), […]

  • (function(i,s,o,g,r,a,m){i[‘GoogleAnalyticsObject’]=r;i[r]=i[r]||function(){
    (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), […]

  • (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({‘gtm.start’:
    new Date().getTime(),event:’gtm.js’});var […]

  • (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({‘gtm.start’:
    new Date().getTime(),event:’gtm.js’});var […]

  • (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({‘gtm.start’:
    new Date().getTime(),event:’gtm.js’});var […]

  • (function(i,s,o,g,r,a,m){i[‘GoogleAnalyticsObject’]=r;i[r]=i[r]||function(){
    (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
    m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
    })(window,document,’script’,’https://www.google-analytics.com/analytics.js’,’ga’);

    ga(‘create’,…[Read more]

  • (function(i,s,o,g,r,a,m){i[‘GoogleAnalyticsObject’]=r;i[r]=i[r]||function(){
    (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
    m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
    })(window,document,’script’,’https://www.google-analytics.com/analytics.js’,’ga’);

    ga(‘create’,…[Read more]

  • Load More