Cissp
The EF is needed to calculate the SLE. The single loss expectancy (SLE) is the cost associated with a single realized risk against a specific asset.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
Here are some excellent resources related to security integrated with acquisition: Improving Cybersecurity and Resilience through Acquisition. Final Report of the Department of Defense and General Services Administration, published November 2013 (www.gsa.gov/portal/getMediaData?mediaId=185371) NIST Special Publication 800-64 Revision 2: Security Co
... See moreMike Chapple, James M. Stewart, Darril Gibson • Cissp
A security model provides a way for designers to map abstract statements into a security policy that prescribes the algorithms and data structures necessary to build hardware and software.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
This image is an example of a data flow diagram that shows each major component of a system, the boundaries between security zones, and the potential flow or movement of information and data. By crafting such a diagram for each environment or system, it is possible to more closely examine each point where a compromise could occur.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
Specialized password hashing functions, such as PBKDF2, bcrypt, and scrypt, allow for the creation of hashes using salts and also incorporate a technique known as key stretching that makes it more computationally difficult to perform a single password guess.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
Risk management/analysis is primarily an exercise for upper management. It is their responsibility to initiate and support risk analysis and assessment by defining the scope and purpose of the endeavor. The actual processes of performing risk analysis are often delegated to security professionals or an evaluation team. However, all risk assessments
... See moreMike Chapple, James M. Stewart, Darril Gibson • Cissp
The state machine model describes a system that is always secure no matter what state it is in. It’s based on the computer science definition of a finite state machine (FSM). An FSM combines an external input with an internal machine state to model all kinds of complex systems, including parsers, decoders, and interpreters.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
Asset valuation is a dollar value assigned to an asset based on actual cost and nonmonetary expenses. These can include costs to develop, maintain, administer, advertise, support, repair, and replace an asset; they can also include more elusive values, such as public confidence, industry support, productivity enhancement, knowledge equity, and owne
... See moreMike Chapple, James M. Stewart, Darril Gibson • Cissp
One of the biggest challenges in implementing a vital records program is often identifying the vital records in the first place!