martes, 25 de septiembre de 2012

Routing Protocols Administrative Distance

Protocol Administrative Distance
Connected 0
Static 1
EIGRP summary 5
External BGP 20
Internal EIGRP 90
IGRP* 100
OSPF 110
IS-IS 115
RIP 120
EGP* 140
ODR 160
External EIGRP 170
Internal BGP 200
Infinite
* Deprecated

jueves, 20 de septiembre de 2012

OSPF NETWORKs TYPES summary

OSPF NETWORK TYPE Helo
Addressing
Database
Exchange
Addresing
DR/BDR
Election
Issues Link
Advertisement
Next Hop
Broadcast Multicast
224.0.0.5
Multicast
224.0.05
224.0.0.6
Yes
  • Partial Mesh, NBMA Topology
  • Hub and spoke
  • Placement of DR (HUB)
  • placement of BDR (none)
Link is advertised as prefix Next hop is advertising router
Nonbroadcast Unicast Unicast Yes
  • Partial Mesh, NBMA
  • Hub and spoke
  • Placement of DR (Hub)
  • Placement of BDR
  • Neighbor Statements
Link is advertised as prefix Next Hop is advertising Router
Point to Point Multicast
224.0.0.5
Multicast
224.0.0.5
No
  • Flood
  • Administration overhead related to the subnetting
Link is advertised as prefix Next hop is the other end of the point-to-point link
Point to mulipoint Broadcast Multicast
224.0.0.5
Multicast
224.0.0.5
No
  • Flood
  • Host entries /32 for the ends of the multipoint colection
Link is advertised as a number of host entries Next hop is the other end of the point-to-point link
Point to Multipoint NonBroadcast Unicast Unicast No
  • Flood
  • Host entries /32 for the ends of the multipoint colection
Link is advertised as a number of host entries Next hop is the other end of the point-to-point link

jueves, 23 de agosto de 2012

Physical Security Considerations

Many companies are merging physical security and IT security departments and functions. This makes a lot of sense given that the line between the two is not at all clear. For example, if a user swipes a badge, then a server unlocks a door, that’s a blend of physical security and IT technology. If that door leads to the computer room or even a wiring closet, then it is IT security, too.  In this domain, both sides will be considered.

martes, 21 de agosto de 2012

Law, Investigation, Forensics and Ethics

One of the most difficult and challenging parts of a security manager’s job responsibility can be the handling of incidents and investigations. Let's dive into this domain to discuss the steps an ISSMP must take to prepare for, detect, react to, correct, report, and learn from every incident that does occur.

Technology Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

The relationship between BCP and DRP is often misunderstood, and even worse, sometimes used interchangeably. A BCP is an examination of a business. It is done once. A DRP is created for every likely or feasible scenario, so that when the bad event happens, a plan will exist for dealing with it. The relationship is one BCP to many DRPs. Now let's dive into this deeper in this video.

jueves, 9 de agosto de 2012

CISSP-ISSMP: Understand Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

Organizations need to prepare for the risk of an interruption to services or operations and put in place plans that will help prevent such failures, minimize the impact if an incident were to happen and manage the recovery to normal operations as quickly as possible. Let's discuss in this domain. 


jueves, 2 de agosto de 2012

CISSP-ISSEP: Technical Management

This domain includes the DoD Acquisition process. This process is normally a profession onto itself, but as system security professionals, we must understand how this process works and how to use it to acquire the necessary equipment ISSEPs need for our engineering and development efforts.

If you have problem watching the video click here

miércoles, 1 de agosto de 2012

CISSP-ISSMP: Security Compliance Management

Security compliance is a demanding and ever-changing world of regulations, standards and audit. Let's look into the areas of concern and opportunity for the information security manager and how to ensure that we are executing our responsibilities in a professional and thorough manner that will protect the interests of our employers and earn the respect of all the stakeholders that rely on us.

CISSP-ISSAP: Cryptography

One of the most important thoughts an ISSAP has to keep in mind when designing a network is that choosing cryptography as a solution always means adopting a key management problem. Keys need to be changed, distributed and recovered, but at the same time, they need to be maintained in a secure fashion. Availability can be seriously impacted by a forgotten or destroyed key, but confidentiality will suffer if there is a breach of the key recovery solution.

jueves, 26 de julio de 2012

TIPS: Linux Vlan Configuration


Now we are going to show how to configure vlans using linux. You may ask why this is necessary? and here is the answer, this is necessary when you connect your linux server directly to a router/L3 Switch and the port in router/switch end is configured as a Trunk port.

The frame that pass through a Trunk port must be tagged with a VLAN ID, This VLAN ID, tells the router what vlan to use to route the traffic to the destination. If the frame that is send through a Trunk port is not tagged then the router is going to discard the frame.
Find Below how to configure vlans with linux

  • 1. Verify if the module is active using the command modprobe. If you do not receive any message then the module is installed and we can continue with step 2


  1. 2. Create the vlan using the command vconfig. The command shown below create vlan 109 in the eth1 interface

vlan creation using vconfig

  1. 3.  Assign an ip address to the vlan.  

ip address using ifconfig

  1. 4. Verify that the VLAN is UP using the command ifconfig 

verify vlan working

This procedure create the vlan in the RAM memory, when you restart the machine all the configuration will be lost. To make the change persistent follow the next procedure

  • Copy the file /etc/sysconfig/network-scripts/ifcfg-eth1 to /etc/sysconfig/network-scripts/ifcfg-eth1.109 

copy file linux
  •  Edit the newly copied file using your preferred linux editor, for this example I’m using vim

vim
  • Change the DEVICE line from eth1 to eth1.109

  •  Add the line VLAN=yes. Your file should look like the image below

  •  Restart the networking daemon using the command “service network restart


CISSP-ISSAP: Communications and network Security

Explain telecommunications RISKS and Solutions

Click Here if you can't see the video

miércoles, 25 de julio de 2012

How to reset iPhone

Has it ever happen that you are using your iPhone and it locks up? You try pressing the sleep/wake button to turn off the phone, and this button does not work.When this happen the only solution is to reset the iPhone (Don't worry you would not erase any information stored on the iphone, is more like a reboot), to do this follow the next steps:

  1. Hold the sleep/wake button at the top right of the phone and the home button at the bottom center of the face at the same time.

  2. iphone buttons location
  3. Hold them until you see the screen go black. Some times you will have to keep holding them even after the red power off slider appears.
  4. Wait Until whe white Apple logo appears
  5. iphone rebooting
  6. The iphone is rebooting

CISSP-ISSEP: Certification and Accreditation (C&A) / Risk Management Framework (RMF)

Webcast that show the differences between Certification and Accreditation (C&A) and the Risk Management Framework (RMF)

Problems watching the video? Please click here

CISSP-ISSMP: System Development Security

This is one of the most important areas of security management today as it continues to grow in importance and relevance to the building of a robust security management program. Watch the video for more

If you have problem viewing the video please click here

viernes, 20 de julio de 2012

ISSMP: Security Management Practices


Problems watching the video Click Here

ISSEP: System Security Engineering

This domain is very critical to passing the ISSEP exam. It is one of the most logical, however, don’t be fooled thinking this domain will be easy. There is a lot of detail which you must understand to be able to select the best answer on the exam. Let's get started.


Problem watching the video click here

Working with HR to Develop End User Awareness Trainin

Are employees at your organization exposing you to cyber attacks?

 Learn about Working with HR to Develop End User Awareness Training and Why it’s Necessary

If you have problem with the video click here