by Esha | Aug 17, 2024 | CISSP
Identity Management based on the IAAA principles: IAAA – Four Key Principles Identification/Assertion: Purpose: Establish the identity of a user or system. Process: Registration, where an individual’s identity is verified and a unique identifier (like a...
by Esha | Aug 17, 2024 | CISSP
Access: Refers to the flow of information between a subject (e.g., a user or program) and an object (e.g., a file or database). Control: Encompasses security features that determine how subjects (users, systems) interact with objects (resources like files, databases)....
by Esha | Aug 17, 2024 | CISSP
Converged Protocols: Integration of specialty/proprietary protocols with standard protocols (like TCP/IP) to use existing network infrastructure without needing new hardware. Fibre Channel over Ethernet (FCoE): Network data-storage solution (SAN/NAS) supporting...
by Esha | Aug 17, 2024 | CISSP
Private Circuit Technologies Dedicated Line: Always available, reserved for communication. Leased Line: Type of dedicated line. T1: 1.5 Mbps via telephone line. T3: 44.7 Mbps via telephone line. E1: European standard, 2.048 Mbps digital transmission. Serial Line IP...
by Esha | Aug 17, 2024 | CISSP
FHSS (Frequency Hopping Spread Spectrum) Operation: Uses the entire range of available frequencies, but only one frequency at a time is employed. Interference: May cause interference with Wi-Fi systems, but Wi-Fi does not use FHSS. DSSS (Direct Sequence Spread...