Thursday, September 25, 2014

Security Definitions

More frequently than not the terms Vulnerability, Threat, Risk, and Exposure are often interchanged.  It is important to acknowledge that these words have are separate and unique meanings. Vulnerability - the lack of a countermeasures or a weakness in those countermeasures in place  e.g., services running on a server, unpatched applications or operating systems, an unrestricted wireless access point, Threat - any...

Thursday, September 18, 2014

Fundamental Principles of Security

Within security there are 3 core fundamental goals which security must provide: Availability, Integrity, and Confidentiality. These pillars create the AIC triad which is designed to serve protection for critical assets.  Each asset requires different levels of protection, security controls, mechanisms, and safeguards to be implemented to provide one or more of these protection types, and all risks, threats, and vulnerabilities are measured...

Tuesday, September 16, 2014

10 CISSP Domains

In the last post, I mentioned that the CISSP Certification Exam covers ten different security domains. These disciplines are defined as: Access Control Telecommunications and Network Security Information Security Government and Risk Management Software Development Security Cryptography Security Architecture and Design Security Operations Business Continuity and Disaster Recovery Planning Legal, Regulations, Investigations, and Compliance Physical (Environmental) Security ...

Monday, September 15, 2014

Defining CISSP

At this point, you may be wondering what exactly it takes to become a CISSP. Firstly, you should know that before you can earn the CISSP designation, you must take the CISSP Certification Exam. The CISSP certification allows companies to find workers with the ability and experience necessary to implement solid security practices by risk analysis and other countermeasures. These measures are further defined below. Growing demand in the security field Increase knowledge on concepts and practices Bring expertise to your occupation To be more...

Wednesday, September 3, 2014

Intro

Hello, My name is Albert Adeseye, I am a Management Information Systems (MIS) major in the Terry College of Business from the University of Georgia. For the next 16 weeks, I will be studying under the supervision of Dr. Piercy of the MIS department focusing on IT security and governance. Our main point of concentration will be guided by the CISSP (Certified Information Systems Security Professional) exam guide, which would further my goal to pursue security in the technology sector and its systems. As computing becomes ubiquitous and more...