July 8, 2019

Domain 2: Asset Security

2.1 Identify and classify information and assets

  • Classifying Data

    • Labels – objects have labels assigned to them. Examples include Top Secret, Secret, Unclassified etc, but are often much more granular. Sensitive data should be marked...

July 8, 2019

Domain 1: Security and Risk Management

1.1 Understand and apply concepts of confidentiality, integrity and availability

  • CIA Triad –

    • Confidentiality – Resources are restricted from unauthorized subjects. Data must be protected in storage, process and transit....

July 8, 2019

Maintained by the International Information System Security Certification Consortium (ISC2), the Certified Information Systems Security Professional certification is a highly sought after designation in the United States and beyond. The credential offers candidates the...

April 9, 2019

Thanks to the IEEE 802.1Q standard, network architects are able to segment traffic on their network into logical groups called Virtual Local Area Networks or VLANs. Traffic governed by these parameters are assigned a “tag” which specifies what VLAN individual data pack...

March 3, 2019

pfSense, currently developed by Netgate, is an open-source firewall solution for small-office

and enterprise environments alike. Although hardware and vendor support isn’t free, the software itself is and can be spun up in a VM with no cost to you. Its ability to run a...

January 10, 2019

While Americans enjoy a number of privacy and data handling laws, the US as a whole continues to slip further behind the curve while other developed nations crank out legislation to meet the increasing cyber threat. Though industry best practices and standards, such as...

December 8, 2018

Technology has brought incredible conveniences to our civilization. It allows us to keep in touch with friends on the other side of the world, and make new ones just across town. We can purchase groceries, pay our bills and perform our jobs from the comfort of our home...

October 26, 2018

For the aspiring security professional, the field can seem a bit like a quagmire at face value. Depending on how much experience you have in IT, the transition can range from challenging to difficult. This article will assume you have at least a beginner’s understandin...

May 29, 2018

Vulnerability assessment and overall risk mitigation strategies are at the very core of any effective security program. Not only does it play a crucial role for any entity, it may also be required by various compliances such as HIPAA and PCI. Though assessments may com...

May 5, 2018

CruSec was a project I kicked around in my head for a few months in mid-2017. I knew that information security was going to take significant chunks of time to earn and maintain proficiency in, and so I wanted a platform that could serve as a hub for all my knowledge an...

Please reload

Featured Posts

How To Get Your Start In Security

October 26, 2018

Please reload

Recent Posts
Please reload

Please reload

Please reload