Cissp
Water cannot be used on Class B fires because it splashes the burning liquids and such liquids usually float on water. Water cannot be used on Class C fires because of the potential for electrocution. Oxygen suppression cannot be used on metal fires because burning metal produces its own oxygen.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
Segregation of duties is similar to a separation of duties and responsibilities policy, but it also combines the principle of least privilege.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
The state machine model describes a system that is always secure no matter what state it is in. It’s based on the computer science definition of a finite state machine (FSM). An FSM combines an external input with an internal machine state to model all kinds of complex systems, including parsers, decoders, and interpreters.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
A security model provides a way for designers to map abstract statements into a security policy that prescribes the algorithms and data structures necessary to build hardware and software.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
Specialized password hashing functions, such as PBKDF2, bcrypt, and scrypt, allow for the creation of hashes using salts and also incorporate a technique known as key stretching that makes it more computationally difficult to perform a single password guess.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
The modulo function is just as important to cryptography as the logical operations are. Be sure you’re familiar with its functionality and can perform simple modular math.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
One of the biggest challenges in implementing a vital records program is often identifying the vital records in the first place!
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
Exposure is being susceptible to asset loss because of a threat; there is the possibility that a vulnerability can or will be exploited by a threat agent or event. Exposure doesn’t mean that a realized threat (an event that results in loss) is actually occurring (the exposure to a realized threat is called experienced exposure).
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
Risk management/analysis is primarily an exercise for upper management. It is their responsibility to initiate and support risk analysis and assessment by defining the scope and purpose of the endeavor. The actual processes of performing risk analysis are often delegated to security professionals or an evaluation team. However, all risk assessments
... See more