CISSP Question of the Week: Pillar of Basel II
Which pillar of Basel II determines the lowest amount of funds that a financial institute must keep on hand?
Read moreWhich pillar of Basel II determines the lowest amount of funds that a financial institute must keep on hand?
Read moreBefore we get to the celebration you’ll have after passing the CISSP, let’s look at some techniques to help you get through the exam. Two of the biggest mistakes people make are not treating it like a marathon and assuming that just because they work in IT or the computer industry, they know the one or more domains on the test and don’t need to study that material.
Read moreBefore we get to the celebration you’ll have after passing the CISSP, let’s look at some techniques to help you get through the exam. Two of the biggest mistakes people make are not treating it like a marathon and assuming that just because they work in IT or the computer industry, they know the one or more domains on the test and don’t need to study that material.
Read moreIf you look at books and publications on cybersecurity, it’s clear that we continue to emphasize common information security best practices: Keep up with patches, disable unnecessary services, have users work with limited privilege, follow system hardening principles, and maintain an ongoing program of user education. Depending on the industry, there are guidelines, standards, or even federal regulations that drive cybersecurity. Unfortunately, as shown by Heartland Payment Systems and Target Stores, these standards are often viewed as encompassing security solutions, rather than baseline, minimal requirements.
Read moreAccording to Donn Parker in Fighting Computer Crime, the weakest link in security is the human. Hackers see the opportunity in having people facilitate the attack. We call this “hacking the human.”
Read more