Krishna Logo
Divied
Call: Sana @ (571) 386-2972

 

Loading
Latest News
Home Navigation Divied
CYBERSECURITY Navigation Divied NOTES
CYBERSECURITY
Showing 1 - 10 of 15 Previous | 1 | 2 | Next
NOTES
 

Review the Artifacts of FISMA Q&A on the last class..  ...  

 
 

  https://www.dhs.gov/publication/dhs-4300a-sensitive-systems-h...  

 
 

https://en.wikipedia.org/wiki/Nimda   Nimda is a file ...  

 
 

  Definition - What does Brute Force Attack mean? ...  

 
 

PLEASE FIND THE ATTACHED FILE   CLICK HERE TO WATCH VIDEO

 
 

PLEASE SEE ATTACHED TEXT FILE

 
 
Date Posted: 03/11/2017

(This measure has not been amended since it was passed by the Senate on December 8, 2014. The summary of that version is repeated here.) Federal Information Security Modernization Act of 2014 - Amends the Federal Information Security Managemen...  

 
 
Date Posted: 03/11/2017

PII WIKI PIDIA   Personally identifiable information (PII), or sensitive personal information (SPI),[1][2][3] as used in information security and privacy laws, is information that can be used on its own o...  

 
 
Date Posted: 03/11/2017

SA&A for Federal Agencies   U.S. federal agencies, and contractors operating IT systems on behalf of the federal government, are mandated by the Federal Information Security Management Act (FISMA) to continuously monitor...  

 
 
Date Posted: 03/11/2017

DEFENSE IN DEPTH   Defense in depth is the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack. Because there are so man...  

 
Showing 1 - 10 of 15 Previous | 1 | 2 | Next
Shadow Bottom
 
 
© 2005 - 2017 Krishna Training.
Designed & Developed By BitraNet