CISSP-ISSAP Introduction, Overview, & CISSP Recap Materials

CISSP-ISSAP Introduction, Overview, & CISSP Recap Materials

The CISSP-ISSAP Cert The Certified Information Systems Security Professional-Information Systems Security Architecture Professional(CISSP-ISSAP) is more than the longest name for a certification known to man. Henceforth the CISSP-ISSAP will be referred to as ISSAP. ISSAP is one of three concentrations of the CISSP available to CISSP holders to further themselves above the CISSP. The most…

Methodology & Terminology 102, Attacker

Methodology & Terminology 102, Attacker

Recap and Intro If the CIA triad is the defender’s goal: confidentiality, Integrity, and availability plus non-repudiation then taking the antonym of all of those words and concepts gives us DAD-A. Better known as the DAD triangle, the attacker’s objectives are the following: disclosure, alteration, destruction, and anonymity. All four of these directly correlating to…

Methodology & Terminology 101, Defender

Methodology & Terminology 101, Defender

Introduction There’s three methodologies that cut to the core of cyber security, and they’ll come up time and time again. There’s the defenders goal, confidentiality, integrity, availability called the CIA triad, additionally non-repudiation. The attackers goals, disclosure, alteration, disruption, and impersonation the opposite of the CIA triad. Then there’s the thing we’re fighting over, data…