Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Blogging Blogs  >  Learning Security with Mayur blogging Blog  > 

Learning Security With Mayur Blog


mayurpahwa.com
This blog explains you information security concepts in a very simple manner. It also focuses on CISSP and SSCP certification and helps you prepare for this examinations.
YouTube Channel (Re)Launch
2022-09-29 02:45
It has been a journey with multiple ups and downs for me. I started this blog 5 years ago, (time flies! you know) and around some time in 2018, I decided on a YouTube Channel. I uploaded som… Read More
Security Policy – How To Write One?
2022-07-16 15:14
 Consider you are a security expert employed by:1) A big entertainment company, OR2) Product Company, OR3) Manufacturing company. And you have been asked to create the security pol… Read More
The  TOCTTOU Attack
2021-06-27 12:12
Intriguing attack name isn’t it? Pronounced as TOCKTOO, this is a time-of-check/time-of-use (TOC/TOU) attack. This deals with the sequence of steps a system uses to complete a task. Th… Read More
Horizon Scanning: A Beginner’s Guide
2021-06-20 09:28
“Horizon scanning is a technique for detecting early signs of potentially important developments through a systematic examination of potential threats and opportunities, with emphasis… Read More
Data Security Lifecycle 2.0
2021-06-13 10:15
The Cloud Security Alliance Guidance explains the Data Security Lifecycle which mentions the various phases data undergoes in the cloud. This lifecycle was adopted from a blog article on Sec… Read More
Governance & Risk Management In The Cloud
2021-01-31 08:26
Governance and Risk management are some of the most important aspects of any business, irrespective of the fact whether you are running your applications (business) in the cloud / on-prem or… Read More
Zero Trust Model - The Present Necessity
2020-07-25 12:46
When I was preparing for CISSP 3 years back, a line from the book AIO guide - Shon Harris really made an impact on me. It goes like this “ There are only two people in the world I trus… Read More
Cloud Computing - The Logical Model
2020-07-05 10:32
At a high level, both cloud and traditional computing adhere to a logical model that helps identify different layers based on functionality. The four layers are :Infrastructure: The cor… Read More
The Blog Turns 3 !!!
2020-07-05 07:56
Well, time flies and that is absolutely correct. One more year has gone by and the blog has turned 3 now. This year has been full of ups and downs, even from the blog perspective. I hav… Read More
Defining Cloud Computing
2020-06-01 04:41
When you download an image, where does it get stored? You select the path in your system and say then store in a folder in the D:. But if you upload a video on YOUTUBE, where does it get sto… Read More
Understanding The Trusted Platform Module
2020-04-25 08:33
“Trust” is what was the starting point of discussion on PKI. The public key infrastructure is based on the premise to enable trust between unknown parties to ensure the secure tr… Read More
2020-04-19 07:26
In the previous blog post, we learnt about the various pieces of the puzzle called the public key infrastructure. It’s time to learn how these pieces work after fitting together. The… Read More
What Is Public Key Infrastructure (PKI)?
2020-04-18 16:28
Quite often in the world of cryptography will you hear the term, PKI or Public Key Infrastructure. While people often use this term loosely without understanding ( and even appreciating) the… Read More
Mind Map - Access Control
2020-01-26 17:21
The foundation of information security is controlling how resources are accessed so they can be protected from unauthorized modification or disclosure. The controls that enforce access contr… Read More
Block Ciphers - Mode Of Operation (Part 2)
2020-01-19 17:28
In the previous blog post, we learnt about the Electronic Code Book (ECB), Cipher Block Chaining (CBC) and Cipher Feedback (CFB) modes of operation. While the ECB mode has been made for very… Read More
Mind Map - Security Basics
2020-01-12 13:33
While every individual has his/her own way of learning various concepts, certain learning tools such as mind maps do help the individual remember the concepts in stressful situations in a be… Read More
Block Ciphers - Mode Of Operation (Part 1)
2020-01-12 10:24
Block ciphers have several modes of operation and each mode works in a specific way. Each mode of operation has its own utility and performs well under specific circumstances. Sometimes you… Read More
New Year Greetings
2020-01-05 14:51
Dear Reader, Wishing you a very happy and a prosperous new year. While the beginning always calls for new resolutions, I firmly believe that any day is a good day for making a resolution or… Read More
6 Best Practices For Email Security
2019-10-28 10:42
While multiple modes of communication have mushroomed in the past few years, the good old fashioned email remains the top means of communication for the businesses. It also remains the top p… Read More
Cyber Security Awareness Month 2019
2019-10-05 05:26
October is here and that means it’s time to celebrate the cybersecurity awareness month. While the celebrations may last a month, it's important for us to follow basic cyber hygiene pr… Read More
Understanding Privacy
2019-09-02 17:12
Well , most people started talking about privacy only after GDPR came into existence. However , Samuel Warren and Louis Brandeis published “The Right to Privacy” in 1890 in the H… Read More
Practice Exams Now Available On Simpliv
2019-07-11 14:35
Dear Readers, Your love and support are what drives me to move forward and find new ways to make this blog more engaging for you. As a constant endeavor to help you with the preparation of… Read More
Network Segmentation And Segregation
2019-07-07 14:02
The Recipe is simple. Setup a network. Add a bit of internet to the mix. To improve the taste, add firewalls, IDS, IPS, and some monitoring programs. It's time to divide the network so that… Read More
CyberSecurity @ Airports
2019-06-30 09:51
Paul is flying on an airplane from Bangkok to Hawaii. While the air hostess serves him a glass of champagne, Paul enjoys the calmness of the clouds around him. His flight is about to land in… Read More
The Do’s And Don’ts Of A Firewall
2019-06-01 13:55
Having learned about the various kinds of the firewall, we must understand the various do's and don’ts of a firewall. This is not an exhaustive checklist. However, this is more from a… Read More
It’s The Middleman – Proxy Firewall
2019-04-07 09:20
How many of you have applied proxy for one of your friends during the attendance call in the class? If I assume, it’s a yes from everyone, you will have no difficulty in understanding… Read More
Which State Are You In? I’m Stateful.
2019-04-04 14:10
In continuation with our series on understanding the firewalls, the next type is the stateful firewall. This one remembers and keeps track of what packets went where until each particular co… Read More
This One Is All About Packets
2019-04-01 06:05
In the earlier blog post on the basics of the firewall, we learned what exactly is a firewall and what does it do? It’s time to learn about the various types of firewalls and how do th… Read More
The Curious Case Of Firewalls
2019-03-30 15:14
If you are hearing about the term firewall for the first time, and consider it as a wall on fire, you are at the right place. Because that is the overall idea behind this!!!Firewall is one o… Read More
Building Blocks Of A Blockchain - Part 2
2019-01-13 14:44
I strongly suggest that you read the first part before reading this part as I can assure you that the old man still has a long story to tell.Blockchain involves a lot of technical terms whic… Read More
Understanding Blockchain – Part 1
2019-01-07 05:12
In the first part, instead of bombarding you with technical jargons, I will tell you a story. This story will form the basis of understanding the technical jargons which will get introduced… Read More
Digital Signature
2019-01-05 11:44
We learned about the basics of cryptography in the first post. We then learned about the types of cryptography – symmetric and asymmetric (private and public key cryptography). Then we… Read More
Hybrid Cryptography
2018-12-22 06:32
We just love to mix things up. Well, yeah and why not? When we get the best of both the worlds, we can mix anything up. Even when it is so complex in itself like cryptography. In the last ar… Read More
Symmetric And Asymmetric Cryptography
2018-12-15 08:09
Having learned about cryptography in the previous article, it is now time to learn about the types of cryptography. You are right, nothing is complete till we understand its types and subtyp… Read More
Asynchronous & Synchronous Communication
2018-10-27 10:04
Try to read the sentence written after this statement - “youwillpasscisspexamifyoustudyhard”. Clearly, you need to focus on the letters and your mind will try to discern the diff… Read More
The TCP Handshake
2018-10-24 15:43
We learned about the TCP protocol in the article “Understanding TCP and UDP.” A brief mention was made in that article on the 3-way handshake process. Before we delve into that f… Read More
Understanding TCP & UDP
2018-10-22 16:38
Have you ever wondered what happens behind the scenes when you click a video on your favorite website? Or when you are trying to log onto a secure website? There are multiple protocols that… Read More
SSCP 2018 Exam Changes
2018-09-15 06:08
With effect from 1st November 2018, (ISC)2 would be doing a domain refresh in the course content of SSCP certification. This is in line with a refresh cycle of 3 years for every certificatio… Read More
Single Sign On & Kerberos
2018-09-04 17:26
Imagine Susie wants to log on to a company database, her own system, a web server, her webmail and other multitudes of applications. Since she needs to access so many resources, it is extrem… Read More
Access Control And Mark Up Languages
2018-07-08 11:24
Just like humans use language to talk to each other, we use languages to talk to computers as well. From an identity management and access control purposes, we are going to learn about some… Read More
Risk Analysis Approaches
2018-05-24 14:12
Which color do you like? Choose one – Red, Amber or Green. Let’s try another one – How much would you like your company’s risk to cost – 10,000 $, 20,000 $ or 5… Read More
Risk Assessment Methodology
2018-05-24 13:23
Having understood Risk Management & Risk Assessment in earlier blog posts, it is time for us to understand the various methodologies of risk assessment. The industry has different standa… Read More
Understanding Risk Assessment
2018-05-19 06:48
Risk Assessment is a part of the Risk Management process. It is a method of identifying the vulnerabilities and threats and the impact in case the threat agent exploits the vulnerability to… Read More
Demystifying Risk Management
2018-05-16 02:06
When you speak to security professionals or the management in many organizations, most of them are of the opinion that security risk management is all about deploying the latest security too… Read More
Understanding Vulnerability, Threat & Risk
2018-05-12 09:10
Consider the following two examples:There is an office building where there are no physical security controls. There is no perimeter wall to surround the building. On entry, you do not find… Read More
Blog Updates For The Reader
2018-05-07 13:41
Thank you for being a part of this journey with me. Your love and affection have helped me to continuously improve myself and write about information security both in general and related to… Read More
CISSP Domain 8 Changes - 2018 Vs 2015
2018-05-04 15:08
Domain 8 also sees very little change in terms of course content.2015 Exam Outline 2018 Exam Outline Understand and apply security in the Software Development Life Cycle (SDLC)Development m… Read More
CISSP Domain 7 Changes - 2018 Vs 2015
2018-04-30 14:19
As you will see below, there is almost no change in content for this domain. Subjects such as Industry Standards, Asset management, and Duress have been added.2015 Exam Outline 2018 Ex… Read More
CISSP Domain 6 Changes - 2018 Vs 2015
2018-04-25 13:45
Overall Result: Extremely Minor Changes2015 Exam Outline 2018 Exam Outline Design and validate assessment and test strategies Design and validate assessment, test, and audit strategiesInte… Read More
CISSP Domain 5 Changes - 2018 Vs 2015
2018-04-24 15:11
Domain 5 also sees a very limited change in terms of the new exam outline.2015 Exam Outline 2018 Exam Outline Control physical and logical access to assets InformationSystemsDevi… Read More
CISSP Domain 4 Changes - 2018 Vs 2015
2018-04-23 15:06
Here too, the changes are extremely limited. The only major change is the removal of the topic "Prevent and Mitigate network attacks" from the new outline.Overall Change: Limited Change… Read More
CISSP Domain 3 Changes - 2018 Vs 2015
2018-04-23 05:03
When a comparison is done between the two exam outlines the overall result, in this case, would also be  Extremely Limited.The topics have just been moved here and there which hardly si… Read More
CISSP Domain 2 Changes - 2018 Vs 2015
2018-04-22 10:24
There are hardly any changes which have been done in this domain. Cryptography has been explicitly removed and will be added to Data Protection Methods.Overall Result - No Change.2015 Exam O… Read More
CISSP Domain 1 Changes - 2018 Vs 2015
2018-04-21 12:33
The new exam outline has been released by (ISC)2 for the CISSP exam. I will be evaluating each domain of the 2015 & 2018 exam outline and would present you a point by point change in the… Read More
Top IT Security Certifications 2018
2018-04-21 07:57
The year 2018 started with Meltdown & Spectre as the most talked about vulnerabilities. Recently Facebook announced the data misuse of around 87 million+ users whose data had been compro… Read More
Take Control Of Your Data – Part 3
2018-04-17 16:15
It’s not just Google as covered in Part 1 or Facebook in Part 2 who is collecting user data. Even when we browse or download an application from either the play store or iOS store, dat… Read More
Take Control Of Your Data – Part 2
2018-04-15 17:42
The second part of this series deals with handling information on the most populated social media channel of the world – FACEBOOK. In the wake of the data leakage at Facebook via Cambr… Read More
Take Control Of Your Data – Part 1
2018-04-04 14:06
This 3 part series is focused on helping you identify the data which the commonly used services capture and how can we either delete or minimize the data which they capture. This article foc… Read More

Share the post

Learning Security with Mayur

×

Subscribe to Learning Security With Mayur

Get updates delivered right to your inbox!

Thank you for your subscription

×