Hidden Gems in CISSP Material
NobleProg South Africa

Hidden Gems in CISSP Material

Why everyone involved in information security should read the CISSP Material?

For a very long time, CISSP certification has been the pinnacle of information security credentials. As you navigate the extremely vast subject matter spread across different domains, you are bound to be introduced to new terminologies, concepts, and ideas almost irrespective of your experience in this space.

CISSP Certification

Here is a hidden gem from Asset Security. Ensuring that sensitive data does not remain on Media after deletion is tackled in “DATA REMENENCE”. One could always physically destroy the media for reducing the risk of malicious data recovery.?There are many other ways, however.

These include:

  • Clearing
  • Purging
  • Destruction
  • Degaussing
  • Sanitizing
  • Overwriting
  • Wiping
  • Encryption

While some of these terms might be easily understood, some like “Degaussing” might be remembered by the true old-school crowd. Remember the “Degauss” option in your CRT monitor back in the day? When your screen appears a little warped due to magnetic field buildup, you would press this degauss button and screen would fluctuate and viola, good as new. Here is a video on Youtube, https://www.youtube.com/watch?v=qEEaZ1GGl9I .

Did you know that Degaussing was first used on naval warships? Here is a link to dive in a little deeper. https://en.wikipedia.org/wiki/Degaussing

Watching some YouTube videos on Hard disk/Tape degaussing would give you the idea on the actual process and the technique.

CISSP builds a strong foundation in information security, unlike any other certification program. And hence, everyone involved in information security must read the CISSP reference material to enrich their overall understanding

Can you guess which one of the methods to deal with Data remanence is most practical in the Cloud Computing world??

要查看或添加评论,请登录

NobleProg South Africa的更多文章

社区洞察

其他会员也浏览了