9jabook & Tweeterest Digital Network !

from 9jabook

Web

Image

Video

News

Twitter

Information

cissp

security ? are you secure ?lets find out then ?

Members: 5
News Feed : May 14, 2009

Comment Wall

Comment

You need to be a member of cissp to add comments!

Comment by Choochoo Sports Book on April 23, 2009 at 9:13am
http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1328285,00.html#

CISSP Essentials training: Domain 1, Security Management Practices
Comment by 9jabook.com on April 11, 2009 at 10:49am
www.cccure.org
Comment by 9jabook.com on April 11, 2009 at 10:46am
What is TEMPEST?

TEMPEST is said to stand for "Telecommunications Electronics Material Protected From Emanating Spurious Transmissions" but I also found; "Transient Emanations Protected From Emanating Spurious Transmissions", "Transient Electromagnetic Pulse Emanation Standard", "Telecommunications Emission Security Standards", and several similar variations on the theme but there is no official meaning for TEMPEST it is more the name of the phenomenon rather than an acronym.

How do these “intelligence-bearing emanations” occur? Basic electromagnetic theory tells us that electromagnetic fields occur as current flows through a conductor. A conductor can be anything metal (your power cord, your CAT5 cable, your phone cord, etc). How does your CAT5 cable pass data? In a simple explanation, current is pushed along the wire and the data goes with it; the more current pushed down the wire and the longer the wire the greater potential for these “emanations” because of growing electromagnetic fields.
Comment by 9jabook.com on April 11, 2009 at 10:40am
GASSP

Generally Accepted System Security Principles are summarised as follows..

Support Mission of Organization

Cost effective

Data owner's have responsibility outside of their organization

Explicit policies naming responsibilities and accountability that is coherent with all the other organizations policies and should be integrated with these policies

All users should receive awareness training

Security professionals should bind to code of ethics


Breaches should be reported in timely manner

systems should be assessed regulaly

principle of least privilege, separation of duties,BCP, simple safeguards.
Comment by 9jabook.com on April 11, 2009 at 10:26am
The Internet Activities Board


http://www.rfc-archive.org/getrfc.php?rfc=1160
Comment by 9jabook.com on April 11, 2009 at 10:16am
www.incidents.org
 

Members (5)

 
 
 

© 2023   Created by 9jabook.com.   Powered by

Badges  |   |  Terms of Service

google.com, pub-3238264936112188, DIRECT, f08c47fec0942fa0 --> tweet Search Related Posts Plugin ... google.com, pub-3238264936112188, DIRECT, f08c47fec0942fa0