martes, 25 de septiembre de 2012

Routing Protocols Administrative Distance

Protocol Administrative Distance
Connected 0
Static 1
EIGRP summary 5
External BGP 20
Internal EIGRP 90
IGRP* 100
OSPF 110
IS-IS 115
RIP 120
EGP* 140
ODR 160
External EIGRP 170
Internal BGP 200
Infinite
* Deprecated

jueves, 20 de septiembre de 2012

OSPF NETWORKs TYPES summary

OSPF NETWORK TYPE Helo
Addressing
Database
Exchange
Addresing
DR/BDR
Election
Issues Link
Advertisement
Next Hop
Broadcast Multicast
224.0.0.5
Multicast
224.0.05
224.0.0.6
Yes
  • Partial Mesh, NBMA Topology
  • Hub and spoke
  • Placement of DR (HUB)
  • placement of BDR (none)
Link is advertised as prefix Next hop is advertising router
Nonbroadcast Unicast Unicast Yes
  • Partial Mesh, NBMA
  • Hub and spoke
  • Placement of DR (Hub)
  • Placement of BDR
  • Neighbor Statements
Link is advertised as prefix Next Hop is advertising Router
Point to Point Multicast
224.0.0.5
Multicast
224.0.0.5
No
  • Flood
  • Administration overhead related to the subnetting
Link is advertised as prefix Next hop is the other end of the point-to-point link
Point to mulipoint Broadcast Multicast
224.0.0.5
Multicast
224.0.0.5
No
  • Flood
  • Host entries /32 for the ends of the multipoint colection
Link is advertised as a number of host entries Next hop is the other end of the point-to-point link
Point to Multipoint NonBroadcast Unicast Unicast No
  • Flood
  • Host entries /32 for the ends of the multipoint colection
Link is advertised as a number of host entries Next hop is the other end of the point-to-point link

jueves, 23 de agosto de 2012

Physical Security Considerations

Many companies are merging physical security and IT security departments and functions. This makes a lot of sense given that the line between the two is not at all clear. For example, if a user swipes a badge, then a server unlocks a door, that’s a blend of physical security and IT technology. If that door leads to the computer room or even a wiring closet, then it is IT security, too.  In this domain, both sides will be considered.

martes, 21 de agosto de 2012

Law, Investigation, Forensics and Ethics

One of the most difficult and challenging parts of a security manager’s job responsibility can be the handling of incidents and investigations. Let's dive into this domain to discuss the steps an ISSMP must take to prepare for, detect, react to, correct, report, and learn from every incident that does occur.

Technology Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

The relationship between BCP and DRP is often misunderstood, and even worse, sometimes used interchangeably. A BCP is an examination of a business. It is done once. A DRP is created for every likely or feasible scenario, so that when the bad event happens, a plan will exist for dealing with it. The relationship is one BCP to many DRPs. Now let's dive into this deeper in this video.

jueves, 9 de agosto de 2012

CISSP-ISSMP: Understand Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

Organizations need to prepare for the risk of an interruption to services or operations and put in place plans that will help prevent such failures, minimize the impact if an incident were to happen and manage the recovery to normal operations as quickly as possible. Let's discuss in this domain.