biometrics

Learn about Biometrics in CISSP

Continuing our discussion on the authentication methods, we are going to talk about Biometrics. Biometrics Applying statistical analysis to biological data. The third category of authentication methods...
about-access-control

Learn about Access Control in CISSP

As I told you earlier in this series when talking about categories of security countermeasures, there are three categories of countermeasures: administrative, physical, and...
access-control

Learn What is Access Control in CISSP

Welcome to Access Control; another important domain from the eight domains that the CISSP exam will challenge your knowledge in. And apart from the exam,...
policies-and-procedures

Learn Different Types of Policies and Procedures in CISSP

An organization should define its security plan. Security follows a top-down approach. In other words, the security strategy and scope are discussed, defined, and...
risk-analysis

Learn About the Different Types of Risk Analysis in CISSP

In the previous article, we talked about the risk assessment process. The output of this process is a list of existing vulnerabilities, associated threats,...

Learn about Risk Management in CISSP

Earlier in this series, we have defined risk as the possibility or chance that a threat agent would exploit an identified vulnerability to gain...
security-governance

Learn about Security Governance in CISSP

Security is no longer considered to be some sort of luxury. Today, being adequately secure is vital for companies to survive and stay in...
Security Controls

Learn Different types of Security Controls in CISSP

After introducing the three categories of security countermeasures: technical, physical, and administrative, it is time to classify them according to their functional uses. An...
Used Terms

Learn the Commonly-Used Terms in CISSP

Before diving into details, and being flooded by huge number of new terms, I found it necessary to set up the base that we...
Systems-Security

Become a Trained Certified Information Systems Security Professional

Introduction on CISSP Tutorial Welcome to CISSP; the world's most appreciated and recognized Certificate in the Field of information systems security. In this series of...
- Advertisement -

Marketing

Java-Myths-Featured-Image

Most Common Myths Surrounding Java Programming

In this article, we will study about myths of java programming which are just a misconception and incorrect views about java. Different myths of Java...
Kotlin & Spring

Beginners Guide To Couchbase With Kotlin & Spring

Couchbase server is an open source, multi-model NoSQL document-oriented database. Perhaps, it won’t be wrong to say that it is a merger of two popular NoSQL technologies: ...
Java Stream Collectors

Functionality and Uses Of Java Stream Collectors

With Java 8, we were introduced to a new abstraction called Stream, using which we can process data in a declarative manner. This, when...