
Simple CISSP

A proxy server is similar but takes it to the next level – it understands the software that is running on the computers, not just network protocols. Proxy servers often implement request caching to increase performance. A forwarding proxy allows the client to indicate which server it wishes to speak to. An open proxy is a forwarding proxy that is a
... See morePhil Martin • Simple CISSP
While FHSS created multiple channels, it only used one at a time, so it is technically not multiplexing like Orthogonal Frequency-Division Multiplexing (OFDM). Each channel used by ODFM is orthogonal (perpendicular) to the channel next to it so that they do not interfere with each other – this allows each channel to be a very narrow band. ODFM is u
... See morePhil Martin • Simple CISSP
BCP policy must then be constructed that contains its scope, mission, principles, guidelines and standards. Project management is crucial for BCP to ensure it does not run out of funds, and management of scope is one of the key responsibilities of this management. A SWOT analysis is helpful, which looks at the following four areas: Strengths (or ad
... See morePhil Martin • Simple CISSP
If you will remember, each layer in the OSI model wraps the message from the layer above in its own envelope – this process is called data encapsulation. The resulting message from each layer has its own name. Before the message gets to the transport layer, it is simply called ‘data’. One of the strange things is that when the transport layer wraps
... See morePhil Martin • Simple CISSP
A process can be a block of code executing in-memory, and therefore a vulnerability in a process is also a software vulnerability.
Phil Martin • Simple CISSP
Beyond creating and maintaining certificates, CAs are also responsible for revoking certificates, by adding the certificate to a certificate revocation list, or CRL. Unfortunately, browsers do not always check CRLs when setting up an SSL/TLS connection, which represents a significant security concern. The online certificate status protocol, or OCSP
... See morePhil Martin • Simple CISSP
Sometimes a computer will send out an explorer packet to a destination that will return the path it took, and the computer will insert instructions into the packet header telling the bridge or router the exact path the frame or packet should travel. This is called source routing, and is very much frowned upon – we should let the network devices fig
... See morePhil Martin • Simple CISSP
There are four components to managing risk: The Frame component defines the assumptions, constraints, priorities and the amount of risk the organization can tolerate. The Assess component determines threats, vulnerabilities and attack vectors. The Respond component matches the available resources against a prioritized list of risks. The Monitor com
... See morePhil Martin • Simple CISSP
If data is transmitted over baseband, then the entire channel is being used. If the channel has been split up into sub-channels, we are communicating over broadband – this allows us to send different types of data simultaneously.