Tag: security
Domain3: Understanding Security Architecture and Engineering in CISSP
Introduction:Welcome back, friends, to the ongoing series titled “Concepts of CISSP.” Today, we’re diving into Domain 3, which focuses on Security Architecture and Engineering. Before we explore this domain, let’s recap the foundational concepts covered in Domains 1 and 2. Recap of Domain 1 and 2:In Domain 1, we laid the groundwork by discussing the … More Domain3: Understanding Security Architecture and Engineering in CISSP
A Future Ransomware Attack exploiting the CrowdStrike Incident Vulnerabilities
Timeline of Events Day 1: Discovery and Initial Breach 08:00 AMA group of sophisticated cybercriminals identifies a vulnerability in the CrowdStrike Falcon software, based on the incident from July 2024. They exploit an unpatched version running on the IT systems of a major metropolitan hospital and an international airline. 09:30 AMThe attackers breach the hospital’s … More A Future Ransomware Attack exploiting the CrowdStrike Incident Vulnerabilities
The Ripple Effect of the CrowdStrike Incident – An Expanded Attack Surface and Potential Future Threats
The CrowdStrike incident in July 2024, which resulted in the blue screen of death (BSOD) affecting millions of Windows computers globally, not only highlighted vulnerabilities within IT infrastructure but also potentially handed malicious actors new clues about weak points to exploit. This incident underscores the increased attack surface area and the heightened risk of future … More The Ripple Effect of the CrowdStrike Incident – An Expanded Attack Surface and Potential Future Threats
Understanding the CrowdStrike Incident of July 2024
In July 2024, the digital world was rocked by a significant event: the CrowdStrike incident. In this blog post, we’ll delve into what happened, why it happened, and how the issue is being resolved. This incident, involving CrowdStrike’s Falcon software, caused disruptions to over 8 million Windows computers globally, impacting critical services and daily operations … More Understanding the CrowdStrike Incident of July 2024
Understanding the Bell-LaPadula Model for Secure Computing Systems
Hello friends, welcome back! In this blog post, we will delve into the March 1976 research paper by Elliott Bell and Leonard LaPadula, commonly referred to as the Bell-LaPadula model. This landmark research paper, titled “Secure Computer System Unified Exposition and Multics Interpretation,” is foundational in the field of computer security. It provides a unified … More Understanding the Bell-LaPadula Model for Secure Computing Systems
Understanding Cryptography: A Comprehensive Overview
Cryptography might seem uninteresting or daunting if not properly introduced. For those not involved in networking, network security, or security engineering, this topic can be quite challenging. However, understanding cryptography is crucial in today’s digital world. Drawing from my own experience as an electronics and communication engineering graduate, I know that even with a technical … More Understanding Cryptography: A Comprehensive Overview
Understanding AAA: Authentication, Authorization, and Accounting
Hello friends, today we’ll delve into the concepts of AAA in security. AAA stands for Authentication, Authorization, and Accounting. In this post, we’ll discuss what it means to implement AAA in a system or security policy, define these terms precisely, and provide examples of how AAA is achieved in various systems. We’ll also explore some … More Understanding AAA: Authentication, Authorization, and Accounting
Understanding the Fundamentals of Information Security: A Comprehensive Recap
Hello friends. In this blog post, we will be doing a quick recap, a sort of revision, of what we have discussed so far about the security framework, information security policy, and the CIA triad—confidentiality, integrity, and availability. This recap is based on Visio drawings I developed while preparing for CISSP some time back. These … More Understanding the Fundamentals of Information Security: A Comprehensive Recap
Understanding CIA and Its Universe: A Deep Dive into Information Security
Welcome back! In this blog post, we’ll continue our discussion on the fundamental principles of information security, focusing on the CIA triad—Confidentiality, Integrity, and Availability—and its inverse, DAD (Disclosure, Alteration, and Destruction). We’ll also delve into related concepts like non-repudiation, privacy, and examples that illustrate these terms. The CIA Triad Confidentiality Confidentiality ensures that information … More Understanding CIA and Its Universe: A Deep Dive into Information Security





