ExpertConnect - Mentoring & Discussions

You can join mentoring & discussions for Free Ask Question, Give Answer, Discuss IT Problems, Learn, and Grow

2017-10-20 14:21:42 3

Information Security Governance

The Information Security Governance domain entails the identification of an organization's information assets and the development, documentation, implementation, and updating of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability.

Topic menu

2017-11-02 17:03:05 0
What's in your mind?
Profile picture of Nancy Perez
Nancy Perez
Public
Posted: Apr 12, 2018

which of the two encryption methods (public key cryptography and symmetric key cryptography) are better in speed?

Comment (1) ·  Like (2)
Profile picture of Azhar Khuwaja

Azhar Khuwaja Apr 12, 2018

Symmetric Key Cryptography is fasster than Public Key Cryptography.

Like

Write a new comment...
Ready to post? select an option:
Profile picture of Nancy Perez
Nancy Perez
Public
Posted: Apr 12, 2018 · Updated

What is the main difference between Discretionary Access Control and Mandatory Access Control?

Comment (1) ·  Like (1)
Profile picture of Azhar Khuwaja

Azhar Khuwaja Apr 12, 2018

Mandatory Access Control is usually implemented in Government and security organization where every data asset is labeled depends on its swnairiciry (how freely it is available). On the other hand, Discretionary Access Control rights are at the discretion of administrator or authority (like a regular operrating system).

Like

Write a new comment...
Ready to post? select an option:
Profile picture of Rasheek S Crowley
Posted: Apr 12, 2018

What is Brewer Nash Model and where it is commonly used?

Comment (1) ·  Like (1)
Profile picture of Azhar Khuwaja

Azhar Khuwaja Apr 12, 2018

Brewer Nash Model is also called as “Chinese Wall”. It is very well suited in database applications where you would like to provide access to your supplier or partner but at the same time would like to keep other data isolated.

Like

Write a new comment...
Ready to post? select an option:
Profile picture of Rasheek S Crowley
Posted: Apr 12, 2018

What is the common Integrity Model used by DoD in past?

Comment (1) ·  Like (1)
Profile picture of Azhar Khuwaja

Azhar Khuwaja Apr 12, 2018

Biba was used for Integrity Model by DoD in the past and has been very successful.

Like

Write a new comment...
Ready to post? select an option:
Profile picture of Azhar Khuwaja
Azhar Khuwaja
Public
Posted: Mar 26, 2018

What are various models used to impose access control for Integrity and Confidentiality?

Comment ·  Like
Profile picture of Malini  Patel
Malini Patel
Public
Posted: Nov 2, 2017

Taking the CISSP course and have a question: what is the difference between OSI model and TCP/IP protocol stack?

Comment (1) ·  Like
Profile picture of Azhar Khuwaja

Azhar Khuwaja Nov 4, 2017

OSI model is theoritical and based on 7 layers. TCP/IP is a practical model based on 4 layers only. Though OSI is not practical but it is more referred than TCP/IP protocol stack.

Like

Write a new comment...
Ready to post? select an option: